Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 401 - 450 out of 4,399

Document Document Title
WO/2014/095653A1
A method for scrambling a communication system (EM,REC) consisting of generating, in a signal (S) intended to be transmitted by one or a plurality of transmitters (EM_B1, EM_B2,...,EM_B3) compatible with said communication system (EM,REC...  
WO/2014/094188A1
This device (10) is disposed inside the secure site and comprises a detection facility (11) whose function consists in logging the increase in energy in one of the transmitting or receiving frequency bands. It furthermore comprises a con...  
WO/2014/092702A1
Technology is described for two parties, by leveraging previously established secure connections with third parties, to obtain a shared secret for generating a secure connection with each other in a way that reduces vulnerability to man-...  
WO/2014/080231A1
A method for compensating for transmission channel distortion effects for a data signal transmitted from a first computing device via the transmission channel to a second computing device comprising:combining the data signal with a refer...  
WO/2014/076283A1
The invention relates to a method of detecting a jamming transmitter, affecting a communication user equipment (UE), wherein - said communication user equipment (UE) is adapted for communication with a component of a cellular radio netwo...  
WO/2014/067004A1
A system is provided that has an ECM (electronic counter measures) system and a transponder monitor connected to or forming part of the ECM system. The system monitors for a transponder signal from a remote transponder. The system determ...  
WO/2014/066773A1
An apparatus includes a polynomial register (510) having a plurality of bits, where the polynomial register is configured to store a user-defined polynomial. A transceiver (406, 408) is coupled to a first bus, a second bus, and the polyn...  
WO/2014/066279A1
Provided is an eigendecomposition cipher. Input data is formatted into a numerical representation and arranged as a data matrix. Eigendecomposition is performed on the data matrix to determine at least a first component matrix (of eigenv...  
WO/2014/062315A1
A system and methods for location-based authentication using medium earth orbit (MEO) and low earth orbit (LEO) satellites are presented. Location of a client device is authenticated based on at least one client received MEO satellite si...  
WO/2014/063058A1
Systems and methods for detecting the failure of a precision time source using an independent time source are disclosed. Additionally, detecting the failure of a GNSS based precision time source based on a calculated location of a GNSS r...  
WO/2014/048715A1
Disclosed in the present invention are a wireless communication device and a method for transmitting and receiving wireless signals. The wireless communication device comprises: a first antenna module, for transmitting a signal to a firs...  
WO/2014/042715A1
Arrangements are described that may be used to reduce the intelligibility of speech using masker signals which are obfuscated yet correlated versions of the speech. Other applications of pitch analysis and demodulation are also described...  
WO/2014/041225A1
The invention relates to a method and device for inhibiting 3G and 4G mobile terminals, in which an interfering signal is transmitted in a primary synchronization channel or a secondary synchronization channel or a full synchronization c...  
WO/2014/042615A1
Technologies are generally described for providing secured communications. In some examples, a method performed under control of a first device may include transmitting a jamming signal, receiving a mixed signal that includes the jamming...  
WO/2014/032142A1
The present invention relates to blocking user devices on mobile telecommunication networks, and more specifically the signaling of a blocked state of user devices on mobile telecommunication networks. In this scenario, the present inven...  
WO/2014/014369A1
The subject of the invention is the method of secure wireless data transmission between the peripheral devices of a computer system and a portable communications device with a display, especially between an isolated journalling file syst...  
WO/2014/001323A1
A signal is detected and an unwanted jamming signal is removed from the detected signal. Respective first, second and third correlations between a received signal and signals at first, second and third frequencies are determined over a p...  
WO/2013/185150A1
A receiver includes multi-user detection (MUD) functionality and a cognitive engine. The receiver may also be coupled to multiple antennas and have analog beamforming capability. The cognitive engine is operative for selecting a beam or ...  
WO/2013/181752A1
An anti-jamming subsystem for jamming signals originating along the horizon includes a two-dimensional horizontal array of antennas that effectively has a horizontal circular reception pattern for receiving signals originating along the ...  
WO/2013/176439A1
The present invention relates to a communication jamming method using a routing protocol in a communication network and, more specifically, to a communication jamming method and a communication jamming device, wherein communication jammi...  
WO/2013/173085A2
Disclosed subject matter relates to techniques for predicting jamming effectiveness. In one approach, platform models and propagation models are used to predict maximum threat communication range when jamming is used and when jamming is ...  
WO/2013/171085A1
Method of detecting a jamming transmitter, affecting a communication user equipment, wherein said communication user equipment (UE) is adapted for communication with a component of a cellular code division multiple access (CDMA) based ra...  
WO/2013/166958A1
Provided are a visible-light communication-based encryption, decryption and encryption/decryption method and system. A transmitting end conducts a logic operation on an original data signal and a pseudo code signal changing over unit tim...  
WO/2013/148578A1
Described herein is a low-voltage multi-stage interleaver. The interleaver includes at least a first interleaver stage and a second interleaver stage. The first interleaver stage is either blocked or operating in a saturation region. The...  
WO/2013/143518A1
The invention relates to a method for the self-testing of a reactive radio interferer comprising a plurality of time-synchronized transmitting/receiving lines (C1, C2,...CN), each of which is designed to alternately carry out - monitorin...  
WO/2013/138689A1
Various arrangements for encrypting multiple television channels are presented. A first television channel of a plurality of television channels to be protected via a first entitlement control message (ECM) using a first encryption schem...  
WO/2013/133970A1
A method and system for a radio frequency barrier in a wireless communication network includes a barrier defined for protecting a space within the wireless communication network. A plurality of antennas is located along the barrier. A ra...  
WO/2013/119376A1
A method, an apparatus, and a computer program product for wireless communication are provided in which PAPR for an input of an AGC in a wireless receiver is generated. The AGC may provide a gain-controlled signal to a correlator when th...  
WO/2013/112901A1
A system and method where the "dealer" of a split Master Secret becomes the Master Key Server, whose role is to initially compute the Master Secret, create and distribute shares of the Master Secret to two Distributed Private Key Generat...  
WO/2013/102225A1
The various embodiments include methods and apparatus relating to manufacturing a PCB assembly (350). The layers (300, 305, 310, 315, 320, 325, 330, 335) in a stacked arrangement forming the PCB assembly include at least one RF ground la...  
WO/2013/085487A1
In one embodiment, the present disclosure provides a method that includes segmenting an n-bit exponent e into a first segment et and a number t of k-bit segments ei in response to a request to determine a modular exponentiation result R,...  
WO/2013/072493A1
The invention refers to a method of detecting a jamming transmitter, affecting a communication user equipment, wherein said communication user equipment UE is adapted for communication with a component of a cellular radio network RN havi...  
WO/2013/066463A2
A method for Link 16-based geolocation of hostile jammers comprising the steps of collecting jamming noise l/Q samples at a plurality of locations, determining the relative time delay of reception between two or more of the locations, de...  
WO/2013/059170A1
A method includes, in a data storage device, receiving data having a particular proportion of zero values and one values and scrambling the data to generate scrambled data that has the particular proportion of zero values and one values.  
WO/2013/044284A1
The present invention provides a communications client program and an associated transfer server for onymous and secure communications over the internet. The communications client program is used for electronically sending and receiving ...  
WO/2013/044311A1
The present invention relates to a system and method for facilitating the security of encrypted, data. A plurality of keys are generated for the encryption of data or decryption of data. One or more of these keys is valid for encryption ...  
WO/2013/048672A1
Birefringence in optical fibers is compensated by applying polarization modulation at a receiver. Polarization modulation is applied so that a transmitted optical signal has states of polarization (SOPs) that are equally spaced on the Po...  
WO/2013/041766A1
A radio entity sends a radio configuration request to a configuration system. The configuration system defines the configuration information. The radio entity receives a configuration information. The radio entity sends a radio spectrum ...  
WO/2013/031476A1
A transmission/reception system (1A) comprises a transmission device (10A) and reception device (20A). The transmission device (10A) comprises an encoding unit (11), serializer (12) and transmission unit (13). The reception device (20A) ...  
WO/2013/022719A1
Methods and systems are provided that provide a portable, cryptographic hardware-software device allowing balancing of the needed heightened security while maintaining the modified communication device's original features and value. The ...  
WO/2013/020054A1
In one example, a method may include a telecommunication service provider detecting that a cellular device is located within a transmission-receiving distance of an Internet router, determining that the cellular device is associated with...  
WO/2013/013934A1
The invention relates to a method for transferring informational data (ID) in a passenger transportation device (PB). Said passenger transportation device (PB), such as an aircraft, a ship, et cetera, comprises an informational system (I...  
WO/2013/011500A1
A method for providing spectral and temporal stealthy information transmitted over an optical communication channel, according to which, at the transmitting side, the power spectral density of a pulse sequence bearing the information is ...  
WO/2012/177364A1
Security in inductively coupled communications systems, such as near field communications (NFC), may be improved by restricting signals carrying user data to an authorized data transmission region. Thus, eavesdroppers outside the authori...  
WO/2012/170128A1
An electronic device for generating a masking signal is described. The electronic device includes a plurality of microphones and a speaker. The electronic device also includes a processor and executable instructions stored in memory that...  
WO/2012/167231A1
Methods and systems are provided for a programmable parallel computation and data manipulation accelerator that may be used, for example, in cryptographic calculations. They allow acceleration of a broad variety of cryptographic algorith...  
WO/2012/162128A1
Securing encrypted virtual hard disks may include a variety of processes. In one example, a virtual hard disk is created for a user and encrypted with a volume key, and the volume key placed in an administrator header. The administrator ...  
WO/2012/150601A1
Apparatus and methods for authenticated and automated digital certificate production which may for example employ a computerized method for authenticating documents having VIZ sections, the method comprising capturing an image of a docum...  
WO/2012/148257A1
The present invention relates to a method for use in a wireless sensor network comprising at least one gateway and at least two nodes; said method comprising the steps of: performing a bi-directional authentication between nodes and betw...  
WO/2012/148593A1
A system and method for self-detecting vehicle theft is provided that includes a first antenna (114) and a second antenna (170), both located on a vehicle (130). The first antenna transmits the signal (116) and the second antenna receive...  

Matches 401 - 450 out of 4,399