Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 101 - 150 out of 5,764

Document Document Title
WO/2015/005877A1
This invention is in regards to the device which is used on ATMs and all similar financial machines, where cards with magnetic strips and chips can be used to deposit and/or withdraw money, in order to protect card information by integra...  
WO/2014/209465A3
Embodiments of a method and apparatus for assigning electromagnetic-spectrum (ES) jamming assets are generally described herein. In some embodiments, the method includes dividing an electronic warfare (EW) support area into a grid. The m...  
WO/2014/209465A2
Embodiments of a method and apparatus for assigning electromagnetic-spectrum (ES) jamming assets are generally described herein. In some embodiments, the method includes dividing an electronic warfare (EW) support area into a grid. The m...  
WO/2014/205461A3
The invention provides a process for authenticating an identity of a user accessing a location in a secure manner using a communications device that is in direct communication with an independent server and in secondary communication wit...  
WO/2014/199474A1
The objective of the invention is to provide an encoding method and a communication method wherein a bit error correction is easy for an authorized recipient but difficult for an unauthorized recipient. A transmission path along which bi...  
WO/2014/197676A2
Embodiments of a system and method for providing efficient wideband inverse channelization for direct digital synthesizer based jamming techniques are generally described herein. In some embodiments, metadata associated with a technique ...  
WO/2014/197676A3
Embodiments of a system and method for providing efficient wideband inverse channelization for direct digital synthesizer based jamming techniques are generally described herein. In some embodiments, metadata associated with a technique ...  
WO/2014/183158A1
Disclosed herein generally is a method and a system for generating a secure encryption key. A sequence of photons is received and a filter set is selected for each photon of the sequence of photons. An optical path has branches for each ...  
WO/2014/182550A1
An example method of tactical communication is provided. The method includes receiving information indicating a tactical situation associated with a target area. The tactical situation is one of a missile in-flight, an eavesdropper, a si...  
WO/2014/177616A1
The invention describes a cooling device (100) for cooling a laser arrangement and a laser system comprising at least two of such cooling devices (100). The invention further describes a method of manufacturing the cooling device (100) a...  
WO/2014/177883A1
The invention resides in a system configured to monitor the level of a radio frequency (RF) in oil gas and mining operations using explosive devices. A device, removably mountable on a vehicle, has a plurality of antennae, wherein each a...  
WO/2014/173639A1
The invention relates to a method for radio communication between at least two radio communication stations (6) of a communications network (5) each comprising a transmitter (7) and a receiver. Each of the radio communication stations (6...  
WO/2014/172150A1
A wireless device operating within a wireless communication channel can detect radar signals in one or more sub-channels using sub-channel counter information. The wireless device can receive signal pulses and generate Fast Fourier Trans...  
WO/2014/165172A1
Systems and methods for the wireless pairing of a personal health device (PHD) (105) (e.g., blood glucose monitor) with a computing device (110) (e.g., smartphone) are disclosed herein. In an embodiment, the PHD (105) communicates a priv...  
WO/2014/160194A3
Secrecy scheme systems and associated methods using list source codes for enabling secure communications in communications networks are provided herein. Additionally, improved information-theoretic metrics for characterizing and optimizi...  
WO/2014/149251A1
Methods and systems for masking certain cryptographic operations in a manner designed to defeat side-channel attacks are disclosed herein. Squaring operations can be masked to make squaring operations indistinguishable or less distinguis...  
WO/2014/144601A1
A method of securing communications between a security device and a security server include receiving, at the security server, a registration request from the security device, the registration request being encrypted using an initial reg...  
WO/2014/138645A1
This disclosure includes systems and methods for detecting radar signals by performing an initial spectral analysis to identify candidate radar signals and subsequently determining whether any candidate radar signals are false detections...  
WO/2014/095651A1
Method of decoying of a system for interception and/or jamming, consisting in generating, in a signal to be emitted, a dummy sequence (SYNCF), said method comprising the following steps: - defining said dummy sequence (SYNCF) and its tem...  
WO/2014/098646A1
The protection device is intended for preventing unauthorized probing of segments of optical cable systems and networks for various purposes which are intended to be protected with the aim of attaining access to confidential information ...  
WO/2014/095653A1
A method for scrambling a communication system (EM,REC) consisting of generating, in a signal (S) intended to be transmitted by one or a plurality of transmitters (EM_B1, EM_B2,...,EM_B3) compatible with said communication system (EM,REC...  
WO/2014/094188A1
This device (10) is disposed inside the secure site and comprises a detection facility (11) whose function consists in logging the increase in energy in one of the transmitting or receiving frequency bands. It furthermore comprises a con...  
WO/2014/092702A1
Technology is described for two parties, by leveraging previously established secure connections with third parties, to obtain a shared secret for generating a secure connection with each other in a way that reduces vulnerability to man-...  
WO/2014/080231A1
A method for compensating for transmission channel distortion effects for a data signal transmitted from a first computing device via the transmission channel to a second computing device comprising:combining the data signal with a refer...  
WO/2014/076283A1
The invention relates to a method of detecting a jamming transmitter, affecting a communication user equipment (UE), wherein - said communication user equipment (UE) is adapted for communication with a component of a cellular radio netwo...  
WO/2014/067004A1
A system is provided that has an ECM (electronic counter measures) system and a transponder monitor connected to or forming part of the ECM system. The system monitors for a transponder signal from a remote transponder. The system determ...  
WO/2014/066773A1
An apparatus includes a polynomial register (510) having a plurality of bits, where the polynomial register is configured to store a user-defined polynomial. A transceiver (406, 408) is coupled to a first bus, a second bus, and the polyn...  
WO/2014/066279A1
Provided is an eigendecomposition cipher. Input data is formatted into a numerical representation and arranged as a data matrix. Eigendecomposition is performed on the data matrix to determine at least a first component matrix (of eigenv...  
WO/2014/062315A1
A system and methods for location-based authentication using medium earth orbit (MEO) and low earth orbit (LEO) satellites are presented. Location of a client device is authenticated based on at least one client received MEO satellite si...  
WO/2014/063058A1
Systems and methods for detecting the failure of a precision time source using an independent time source are disclosed. Additionally, detecting the failure of a GNSS based precision time source based on a calculated location of a GNSS r...  
WO/2014/048715A1
Disclosed in the present invention are a wireless communication device and a method for transmitting and receiving wireless signals. The wireless communication device comprises: a first antenna module, for transmitting a signal to a firs...  
WO/2014/042715A1
Arrangements are described that may be used to reduce the intelligibility of speech using masker signals which are obfuscated yet correlated versions of the speech. Other applications of pitch analysis and demodulation are also described...  
WO/2014/041225A1
The invention relates to a method and device for inhibiting 3G and 4G mobile terminals, in which an interfering signal is transmitted in a primary synchronization channel or a secondary synchronization channel or a full synchronization c...  
WO/2014/042615A1
Technologies are generally described for providing secured communications. In some examples, a method performed under control of a first device may include transmitting a jamming signal, receiving a mixed signal that includes the jamming...  
WO/2014/032142A1
The present invention relates to blocking user devices on mobile telecommunication networks, and more specifically the signaling of a blocked state of user devices on mobile telecommunication networks. In this scenario, the present inven...  
WO/2014/014369A1
The subject of the invention is the method of secure wireless data transmission between the peripheral devices of a computer system and a portable communications device with a display, especially between an isolated journalling file syst...  
WO/2014/001323A1
A signal is detected and an unwanted jamming signal is removed from the detected signal. Respective first, second and third correlations between a received signal and signals at first, second and third frequencies are determined over a p...  
WO/2013/185150A1
A receiver includes multi-user detection (MUD) functionality and a cognitive engine. The receiver may also be coupled to multiple antennas and have analog beamforming capability. The cognitive engine is operative for selecting a beam or ...  
WO/2013/181752A1
An anti-jamming subsystem for jamming signals originating along the horizon includes a two-dimensional horizontal array of antennas that effectively has a horizontal circular reception pattern for receiving signals originating along the ...  
WO/2013/176439A1
The present invention relates to a communication jamming method using a routing protocol in a communication network and, more specifically, to a communication jamming method and a communication jamming device, wherein communication jammi...  
WO/2013/173085A2
Disclosed subject matter relates to techniques for predicting jamming effectiveness. In one approach, platform models and propagation models are used to predict maximum threat communication range when jamming is used and when jamming is ...  
WO/2013/173085A3
Disclosed subject matter relates to techniques for predicting jamming effectiveness. In one approach, platform models and propagation models are used to predict maximum threat communication range when jamming is used and when jamming is ...  
WO/2013/171085A1
Method of detecting a jamming transmitter, affecting a communication user equipment, wherein said communication user equipment (UE) is adapted for communication with a component of a cellular code division multiple access (CDMA) based ra...  
WO/2013/166958A1
Provided are a visible-light communication-based encryption, decryption and encryption/decryption method and system. A transmitting end conducts a logic operation on an original data signal and a pseudo code signal changing over unit tim...  
WO/2013/148578A1
Described herein is a low-voltage multi-stage interleaver. The interleaver includes at least a first interleaver stage and a second interleaver stage. The first interleaver stage is either blocked or operating in a saturation region. The...  
WO/2013/143518A1
The invention relates to a method for the self-testing of a reactive radio interferer comprising a plurality of time-synchronized transmitting/receiving lines (C1, C2,...CN), each of which is designed to alternately carry out - monitorin...  
WO/2013/138689A1
Various arrangements for encrypting multiple television channels are presented. A first television channel of a plurality of television channels to be protected via a first entitlement control message (ECM) using a first encryption schem...  
WO/2013/133970A1
A method and system for a radio frequency barrier in a wireless communication network includes a barrier defined for protecting a space within the wireless communication network. A plurality of antennas is located along the barrier. A ra...  
WO/2013/119376A1
A method, an apparatus, and a computer program product for wireless communication are provided in which PAPR for an input of an AGC in a wireless receiver is generated. The AGC may provide a gain-controlled signal to a correlator when th...  
WO/2013/112901A1
A system and method where the "dealer" of a split Master Secret becomes the Master Key Server, whose role is to initially compute the Master Secret, create and distribute shares of the Master Secret to two Distributed Private Key Generat...  

Matches 101 - 150 out of 5,764