Patent classifications
H04W12/79
Intrusion detection and radio fingerprint tracking
A radio transmitter adjusts its radio frequency (RF) fingerprint to defeat RF fingerprinting identification without destroying the content of its transmissions. The radio transmitter comprises a frequency-upconverter configured to upconvert a baseband or intermediate-frequency signal to an RF signal, and an amplifier to amplify the RF signal to produce a transmission signal. An RF fingerprint control circuit changes the non-linear behavior of the frequency-upconverter or the amplifier in order to change the RF fingerprint. The transmitter may create RF fingerprint “personalities” to be paired with different radio protocol behaviors and subscriber terminal identification codes (e.g., MAC addresses or SMSIs) for generating different radio identities.
Detection, analysis, and countermeasures for radio transceivers
A computer-implementable method employs radio signal metadata to train a cognitive learning and inference system to produce an inferred function, wherein the metadata comprises a syntactic structure of at least one radio communication protocol. The inferred function is used to map metadata of a detected radio signal to a cognitive profile of a transmitter of the detected radio signal. The mapping effects intelligent discrimination of the transmitter from at least one other transmitter through corroborative or negating evidentiary observation of properties associated with the metadata of the detected radio signal. A response to the transmitter is based upon the mapping.
Detection, analysis, and countermeasures for radio transceivers
A computer-implementable method employs radio signal metadata to train a cognitive learning and inference system to produce an inferred function, wherein the metadata comprises a syntactic structure of at least one radio communication protocol. The inferred function is used to map metadata of a detected radio signal to a cognitive profile of a transmitter of the detected radio signal. The mapping effects intelligent discrimination of the transmitter from at least one other transmitter through corroborative or negating evidentiary observation of properties associated with the metadata of the detected radio signal. A response to the transmitter is based upon the mapping.
Devices, Systems, and Methods for Security Using Magnetic Field Based Identification
Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.
Electronic device and control method thereof
Disclosed is an electronic device. The electronic device includes a communicator comprising communication circuitry and a processor, the processor is configured to control the communicator to perform communication with an external device based on identifying that a strength of a signal received from an external device is equal to or greater than a predetermined threshold value, and after converting an electronic device to a low power mode, based on identifying that a strength of a signal received from an external device being within a first range, to control the electronic device to perform a secure pairing operation.
SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE
A system may receive first level authentication data from a first user, authorize first level access to a secure device, and transmit a push notification including a second factor authentication key to a first user device responsive to first factor authentication data matching stored authentication data for the first user. The system may receive a wireless communication from the first user device attenuated by one or more beam attenuating materials to form a first attenuated beam profile. In response to a match of the first attenuated beam profile to a stored beam profile beyond a predetermined threshold, the system may associate the second factor authentication key as an authorized login credential for the first user. The system may receive the second factor authentication key from the first user and authorize the second factor authentication data to grant the first user second level access to the secure device.
ELECTRONIC DEVICE AND ELECTRONIC DEVICE CONTROL METHOD
An electronic device includes a memory storing instructions, and a processor configured to execute the instructions to, based on receiving one or more packets from an external device, identify whether the one or more packets are encrypted, acquire first information indicating whether each of the one or more packets is encrypted and second information indicating a received signal strength indicator (RSSI) of each of the one or more packets, and acquire authenticated RSSI information of the external device by identifying RSSI information of an encrypted first packet based on the first information and the second information.
Systems and methods for device fingerprinting
Systems and methods to generate a device composite fingerprint associated with a computing device are described. In one embodiment, communication data associated with the computing device is accessed. The communication data includes device identification data, device group data, and device operational data. A device identity fingerprint associated with the computing device is generated using the device identification data. A device group fingerprint associated with the computing device is generated using the device group data. A device operational fingerprint associated with the computing device is generated using the device operational data. The device identity fingerprint, the device group fingerprint, and the device operational fingerprint are combined to generate a device composite fingerprint.
Methods, systems, and apparatuses for presence detection
Methods, systems, and apparatuses for managing a wireless network are described herein. A wireless network may include a gateway device, an access point, and a group of client devices. An analytics engine may determine a signal characteristic data for a client device, which may indicate network telemetry data for each of the client devices or associated locations during a time period. The analytics engine may utilize a trained classifier to determine that a signal characteristic indicated by the signal characteristic data for a client device satisfies a threshold.
Radio frequency threat detection
A system and method includes receiving, via a fiber optic cable, an analog fiber optic signal that preserves native radio frequency (RF) energy characteristics of at least one first RF signal associated with at least one wireless device, and converting, by a light-to-RF converter, the received analog fiber optic signal into at least one second RF signal. The system and method can further comprise analyzing, by a processor, the at least one second RF signal and generating, by the processor, at least one digital signature associated with the at least one wireless device, respectively, based on the analysis of the at least one second RF signal. The system and method yet further comprise determining, by the processor, if the at least one wireless device associated with the at least one digital signature, respectively, is one of an authorized device and an unauthorized device.