Patent classifications
H04K3/825
Securing Downlink Control Information in Cellular Communication Networks
According to an example aspect of the present invention, there is provided a method including determining at least one possible downlink control information for the user equipment to schedule the data transmission, checking a scrambled version of the at least one possible downlink control information to determine whether the scrambled version of the at least one possible downlink control information defines valid downlink control information, transmitting the scrambled version of the at least one possible downlink control information and scheduling the data transmission based on the at least one possible downlink control information and if it is determined that the scrambled version of the at least one possible downlink control information defines valid downlink control information, scheduling the jamming transmission based on the scrambled version of the at least one possible downlink control information.
Computing device processing expanded data
The present invention relates to a computing device for executing a first cryptographic operation of a cryptographic process on useful input data, said computing device comprising a first processor, a second processor and a selection circuit wherein: —said selection circuit is configured: —for receiving, from an input bus, expanded input data obtained by interleaving dummy input data with said useful input data, —for determining positions of the dummy input data in said expanded input data, —and for extracting said dummy input data and said useful input data from the expanded input data based on said determined positions, —said first processor is configured for executing said first cryptographic operation of said cryptographic process on said extracted useful input data to obtain useful output data, —said second processor is configured for executing a second operation on said extracted dummy input data to obtain dummy output data, said computing device being configured for having said operations executed such that leakage generated by said first cryptographic operation is jammed by leakage generated by the second operation.
Unmanned aerial vehicle with electromagnetic pulse transmitter
An Unmanned Aerial Vehicle is disclosed. The Unmanned Aerial Vehicle includes a body, rotors attached to the body, one or more sensors, and an electromagnetic pulse transmitter. The electromagnetic pulse transmitter is configured to transmit an EMP and the Unmanned Aerial Vehicle is configured to track a target Unmanned Aerial Vehicle using the one or more sensors and direct the electromagnetic pulse transmitter at the target Unmanned Aerial Vehicle to disrupt the target Unmanned Aerial Vehicle.
COMMUNICATION DEVICE AND METHOD FOR SECURE COMMUNICATION
A first communication device for use in a wireless communication system to communicate with a second communication device comprises circuitry configured to transmit probe signals into multiple directions, receive echo signals in response to the transmitted probe signals, and determine the position of a potentially eavesdropping communication device from the received echo signals.
SYSTEM AND METHOD FOR SIGNAL RE-TRANSMISSION
System and for signal re-transmission including a channelizer, a signal-effect-processor and a controller. The signal-ef-fect-processor includes a plurality of sub-band-processors and a summer. The channelizer receives a sampled Intermediate-Frequency signal exhibiting a first sampling-rate. The channelizer produces a plurality of sub-band-signals, each associated with a respective sub-band of the Intermediate-Frequency signal. Each sub-band-signal exhibit a second sampling-rate lower than the first sampling-rate. Each of at least one selected sub-band-processor receives a respective sub-band-signal, introduces at least one effect to the respective sub-band-signal, and increases the sampling-rate of the respective sub-band-signal to the first sampling-rate, thereby producing a respective affected sub-band re-transmit signal. Each selected sub-band-processor is further provides the respective affected sub-band re-transmit signal to a respective input of the summer. The summer sums the inputs thereof to produce a wideband affected re-transmit signal. The controller selects the selected sub-band processor and controls settings of the at least one effect.
SYSTEMS AND METHODS FOR COVERT COMMUNICATIONS
A communications system and methods for covert communications are provided. A first transmitter that transmits an information carrying signal to a target receiver, a second transmitter and a third transmitter transmit jamming signals to the target receiver, such that the information carrying signals and the jamming signals are interleaved when received by the target receiver The information carrying signals and the jamming signals can be at least partially overlapping by an eavesdropper.
TECHNIQUES FOR PERFORMING PHYSICAL LAYER SECURITY DURING FULL-DUPLEX COMMUNICATIONS
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive, from a base station, a control signal scheduling the UE to receive a downlink message from the base station using a set of time and frequency resources. The UE may identify an aggressor UE attempting to receive uplink communications, downlink communications, or both, transmitted between the UE and the base station and determine a transmit power for transmitting a jamming signal to the aggressor UE during the set of time and frequency resources. The UE may apply a jamming signal power scheme to the jamming signal by either using the determined transmit power or adjusting the determined transmit power in accordance with the jamming signal power scheme.
System and method for detecting and controlling contraband devices in a correctional facility utilizing portable electronic devices
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices and drones/UAVs by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.
Privacy device for smart speakers
Systems, apparatuses, and methods are described for a privacy blocking device configured to prevent receipt, by a listening device, of video and/or audio data until a trigger occurs. A blocker may be configured to prevent receipt of video and/or audio data by one or more microphones and/or one or more cameras of a listening device. The blocker may use the one or more microphones, the one or more cameras, and/or one or more second microphones and/or one or more second cameras to monitor for a trigger. The blocker may process the data. Upon detecting the trigger, the blocker may transmit data to the listening device. For example, the blocker may transmit all or a part of a spoken phrase to the listening device.
PHYSICAL LAYER SECURITY ACTIVATION
Methods, systems, and devices for wireless communications are described. In some wireless communications systems, a user equipment (UE) may receive, from a base station, control signaling identifying a configuration of a set of time intervals for communication with the base station, the set of time intervals including a subset of the time intervals for which the UE is to perform a physical layer security procedure. In some cases, the UE may activate a timer associated with performing the physical layer security procedure in response to a trigger. The UE and the base station may communicate one or more messages using the physical layer security procedure, for example, in the subset of the time intervals identified by the control signaling, while the timer is active, or both. The physical layer security procedure may involve the UE performing physical layer security encoding, signal jamming, or both.