Patent classifications
H04K3/25
METHOD AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR NETWORK SECURITY
A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an identifier of the encryption key and transmits the encrypted broadcast message over a broadcast channel. A method for decrypting a broadcast message that is encrypted is also disclosed.
Radar transmission time interval randomized radar transmissions
Certain aspects provide a method for radar detection by an apparatus. The method including transmitting a radar waveform in transmission time intervals (TTIs) to perform detection of a target object. The method further includes varying the radar waveform across TTIs based on one or more radar transmission parameters.
Compound transmission security (TRANSEC) for military-grade fifth generation (5G) radio systems
A multi-user (MU) multiple-input/multiple-output (MU MIMO) module for a fifth-generation (5G) software-defined radio (SDR) network environment is disclosed. In embodiments, the MU MIMO module of a transmitting SDR system of a 5G mobile ad hoc network (MANET) or other peer-to-peer directional network receives feedback from a receiving SDR system based on a prior or current frame and generates, based on the feedback, a compound transmission security (TRANSEC) encryption key for a subsequent frame. The compound TRANSEC encryption key encrypts the transmission of the subsequent frame through a combination of frequency-hopping encryption codes, orthogonality-hopping encryption codes, and dynamic pseudorandom distribution of transmitting power among antenna elements to simulate multipath hopping. The SDR system may include an antenna controller capable of managing dynamic power distribution according to the compound TRANSEC encryption keys as well as directionality shifts and beamforming operations to evade jammers detected within the 5G network environment.
Ensuring transmissions are completed in a wireless network
A method comprising determining that interference may occur in a wireless network an apparatus is connected to, obtaining a first link that is of a first type, obtaining a second link that is of a second type, determining data to be transmitted from the apparatus to another apparatus connected to the wireless network, determining that a transmission occurs in the first link and transmitting the data in the second link, wherein the transmission in the first link has a longer duration than transmitting the data in the second link and the transmission in the first link and transmitting the data in the second link overlap in time.
Methods for radar coexistence
A method and apparatus for selecting frequency modulated continuous wave waveform parameters for multiple radar coexistence by a user equipment is described. The user equipment may transmit a radar waveform consisting of a number of chirps, with each chirp having a same duration. The user equipment may vary waveform parameters of the radar waveform for at least a subset of the number of chirp, where the waveform parameters may be chosen from a codebook comprising at least one codeword of parameters. Reflected radar waveforms are received and processed where the processing includes applying a fast time discrete Fourier transform to reflected radar waveforms to produce a one dimension peak in a time delay dimension for each reflected waveform; and applying a slow time discrete Fourier transform to the reflected radar waveforms, where peaks for the reflected waveforms are added.
WAVEFORM ANALYSIS AND VULNERABILITY ASSESSMENT (WAVE) TOOL
A waveform analysis and vulnerability assessment (WAVE) tool is disclosed that can analyze the characteristics and vulnerabilities of waveforms. The WAVE tool may identify issues in waveforms prior to their implementation in a transmit device or building the back-end processing to receive the waveform at a ground station. The WAVE tool may quantify waveform vulnerabilities, address which vulnerabilities a particular waveform has, and enable the user to modify the waveform design to optimize its performance against threats prior to implementation. Additionally, the WAVE tool may save time and money since new waveforms can be vetted against the tool before implementation. Data from waveforms can be analyzed against a plurality of metrics and scores can be generated providing a quantitative assessment of waveform performance.
FREQUENCY JAMMING DETECTION AND JAMMER DIRECTION DETECTION
A mobile device sends to a radio communicatively coupled to the mobile device, an instruction to monitor a frequency band. It is determined that the frequency band is jammed by a jamming source. The mobile device receives, from the radio, signal waveform information corresponding to the frequency band that is received by the radio from a 360 span about the radio. Based on the waveform information a direction of the jamming source is determined. The mobile device presents on a display device information that indicates that the frequency band is being jammed, and a direction of the jamming source with respect to a current location of the radio.
ADJUSTABLE NULL STEERING IN A STATIONARY NETWORK
A null steering adjuster in a stationary wireless network identifies the presence or absence of a current set of phase differences in a dataset. The dataset includes legitimate sets of phase differences detected between radio frequency signals received by multiple antennas from respective legitimate sources. The current set of phase differences is detected between radio frequency signals currently received by the antennas. When the current set of phase differences is absent from the dataset, a null is created in the antenna pattern of the antennas in the direction of the currently-received radio frequency signals. When the current set of phase differences is present in the dataset, the antenna pattern is maintained.
Wireless Vibrometer with Antenna Array
A wireless vibrometer employs an antenna array to significantly boost the signal-to-noise ratio of faint received signals twin small objects vibrating at acoustic frequencies. This technique may be used to provide an improved physiological monitor (such as a pulse detector) or for long-range eavesdropping using the emitted power from a cell phone or the like.
Wavelet transformation based anti-jam processing techniques
Wavelet transformation based anti-jam processing methods and systems are disclosed. An anti-jam processing method may include: generating a wavelet transformation for a unit of a received signal; weighting each element in the wavelet transformation to generate a weighted wavelet transformation; evaluating jammer suppression performances of a plurality of time and frequency resolution levels defined for an inverse wavelet transformation; selecting a particular time and frequency resolution level among the plurality of time and frequency resolution levels; and applying the inverse wavelet transformation to the weighted wavelet transformation, wherein the inverse wavelet transformation is applied based on the particular time and frequency resolution level selected.