Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 101 - 150 out of 5,684

Document Document Title
WO/2014/041225A1
The invention relates to a method and device for inhibiting 3G and 4G mobile terminals, in which an interfering signal is transmitted in a primary synchronization channel or a secondary synchronization channel or a full synchronization c...  
WO/2014/042615A1
Technologies are generally described for providing secured communications. In some examples, a method performed under control of a first device may include transmitting a jamming signal, receiving a mixed signal that includes the jamming...  
WO/2014/032142A1
The present invention relates to blocking user devices on mobile telecommunication networks, and more specifically the signaling of a blocked state of user devices on mobile telecommunication networks. In this scenario, the present inven...  
WO/2014/014369A1
The subject of the invention is the method of secure wireless data transmission between the peripheral devices of a computer system and a portable communications device with a display, especially between an isolated journalling file syst...  
WO/2014/001323A1
A signal is detected and an unwanted jamming signal is removed from the detected signal. Respective first, second and third correlations between a received signal and signals at first, second and third frequencies are determined over a p...  
WO/2013/185150A1
A receiver includes multi-user detection (MUD) functionality and a cognitive engine. The receiver may also be coupled to multiple antennas and have analog beamforming capability. The cognitive engine is operative for selecting a beam or ...  
WO/2013/181752A1
An anti-jamming subsystem for jamming signals originating along the horizon includes a two-dimensional horizontal array of antennas that effectively has a horizontal circular reception pattern for receiving signals originating along the ...  
WO/2013/176439A1
The present invention relates to a communication jamming method using a routing protocol in a communication network and, more specifically, to a communication jamming method and a communication jamming device, wherein communication jammi...  
WO/2013/173085A2
Disclosed subject matter relates to techniques for predicting jamming effectiveness. In one approach, platform models and propagation models are used to predict maximum threat communication range when jamming is used and when jamming is ...  
WO/2013/173085A3
Disclosed subject matter relates to techniques for predicting jamming effectiveness. In one approach, platform models and propagation models are used to predict maximum threat communication range when jamming is used and when jamming is ...  
WO/2013/171085A1
Method of detecting a jamming transmitter, affecting a communication user equipment, wherein said communication user equipment (UE) is adapted for communication with a component of a cellular code division multiple access (CDMA) based ra...  
WO/2013/166958A1
Provided are a visible-light communication-based encryption, decryption and encryption/decryption method and system. A transmitting end conducts a logic operation on an original data signal and a pseudo code signal changing over unit tim...  
WO/2013/148578A1
Described herein is a low-voltage multi-stage interleaver. The interleaver includes at least a first interleaver stage and a second interleaver stage. The first interleaver stage is either blocked or operating in a saturation region. The...  
WO/2013/143518A1
The invention relates to a method for the self-testing of a reactive radio interferer comprising a plurality of time-synchronized transmitting/receiving lines (C1, C2,...CN), each of which is designed to alternately carry out - monitorin...  
WO/2013/138689A1
Various arrangements for encrypting multiple television channels are presented. A first television channel of a plurality of television channels to be protected via a first entitlement control message (ECM) using a first encryption schem...  
WO/2013/133970A1
A method and system for a radio frequency barrier in a wireless communication network includes a barrier defined for protecting a space within the wireless communication network. A plurality of antennas is located along the barrier. A ra...  
WO/2013/119376A1
A method, an apparatus, and a computer program product for wireless communication are provided in which PAPR for an input of an AGC in a wireless receiver is generated. The AGC may provide a gain-controlled signal to a correlator when th...  
WO/2013/112901A1
A system and method where the "dealer" of a split Master Secret becomes the Master Key Server, whose role is to initially compute the Master Secret, create and distribute shares of the Master Secret to two Distributed Private Key Generat...  
WO/2013/102225A1
The various embodiments include methods and apparatus relating to manufacturing a PCB assembly (350). The layers (300, 305, 310, 315, 320, 325, 330, 335) in a stacked arrangement forming the PCB assembly include at least one RF ground la...  
WO/2013/085487A1
In one embodiment, the present disclosure provides a method that includes segmenting an n-bit exponent e into a first segment et and a number t of k-bit segments ei in response to a request to determine a modular exponentiation result R,...  
WO/2013/072493A1
The invention refers to a method of detecting a jamming transmitter, affecting a communication user equipment, wherein said communication user equipment UE is adapted for communication with a component of a cellular radio network RN havi...  
WO/2013/066463A2
A method for Link 16-based geolocation of hostile jammers comprising the steps of collecting jamming noise l/Q samples at a plurality of locations, determining the relative time delay of reception between two or more of the locations, de...  
WO/2013/059170A1
A method includes, in a data storage device, receiving data having a particular proportion of zero values and one values and scrambling the data to generate scrambled data that has the particular proportion of zero values and one values.  
WO/2013/044284A1
The present invention provides a communications client program and an associated transfer server for onymous and secure communications over the internet. The communications client program is used for electronically sending and receiving ...  
WO/2013/044311A1
The present invention relates to a system and method for facilitating the security of encrypted, data. A plurality of keys are generated for the encryption of data or decryption of data. One or more of these keys is valid for encryption ...  
WO/2013/048672A1
Birefringence in optical fibers is compensated by applying polarization modulation at a receiver. Polarization modulation is applied so that a transmitted optical signal has states of polarization (SOPs) that are equally spaced on the Po...  
WO/2013/043943A3
A system, method, and apparatus for processing confidential information. In one embodiment, the method includes: receiving confidential information on an incoming line coupled to the call center server; intercepting a DTMF tone portion o...  
WO/2013/041766A1
A radio entity sends a radio configuration request to a configuration system. The configuration system defines the configuration information. The radio entity receives a configuration information. The radio entity sends a radio spectrum ...  
WO/2013/031476A1
A transmission/reception system (1A) comprises a transmission device (10A) and reception device (20A). The transmission device (10A) comprises an encoding unit (11), serializer (12) and transmission unit (13). The reception device (20A) ...  
WO/2013/024463A3
Disclosed are wireless communication systems and methods for calibrating same. The communication systems may include first wireless transceivers having: (a) a modem, and (b) one or more Radio Frequency (RF) chain pairs. There may also be...  
WO/2013/022719A1
Methods and systems are provided that provide a portable, cryptographic hardware-software device allowing balancing of the needed heightened security while maintaining the modified communication device's original features and value. The ...  
WO/2013/020054A1
In one example, a method may include a telecommunication service provider detecting that a cellular device is located within a transmission-receiving distance of an Internet router, determining that the cellular device is associated with...  
WO/2013/013934A1
The invention relates to a method for transferring informational data (ID) in a passenger transportation device (PB). Said passenger transportation device (PB), such as an aircraft, a ship, et cetera, comprises an informational system (I...  
WO/2013/011500A1
A method for providing spectral and temporal stealthy information transmitted over an optical communication channel, according to which, at the transmitting side, the power spectral density of a pulse sequence bearing the information is ...  
WO/2013/002833A3
Systems and methods for binding of cryptographic content using unique device characteristics with server heuristics in accordance with embodiments of the invention are disclosed. One embodiment includes a processor and memory includes co...  
WO/2012/177364A1
Security in inductively coupled communications systems, such as near field communications (NFC), may be improved by restricting signals carrying user data to an authorized data transmission region. Thus, eavesdroppers outside the authori...  
WO/2012/170128A1
An electronic device for generating a masking signal is described. The electronic device includes a plurality of microphones and a speaker. The electronic device also includes a processor and executable instructions stored in memory that...  
WO/2012/167231A1
Methods and systems are provided for a programmable parallel computation and data manipulation accelerator that may be used, for example, in cryptographic calculations. They allow acceleration of a broad variety of cryptographic algorith...  
WO/2012/162128A1
Securing encrypted virtual hard disks may include a variety of processes. In one example, a virtual hard disk is created for a user and encrypted with a volume key, and the volume key placed in an administrator header. The administrator ...  
WO/2012/150601A1
Apparatus and methods for authenticated and automated digital certificate production which may for example employ a computerized method for authenticating documents having VIZ sections, the method comprising capturing an image of a docum...  
WO/2012/148257A1
The present invention relates to a method for use in a wireless sensor network comprising at least one gateway and at least two nodes; said method comprising the steps of: performing a bi-directional authentication between nodes and betw...  
WO/2012/148593A1
A system and method for self-detecting vehicle theft is provided that includes a first antenna (114) and a second antenna (170), both located on a vehicle (130). The first antenna transmits the signal (116) and the second antenna receive...  
WO/2012/133601A1
Parameters of a hidden Markov model (HMM) are determined by a server based on an observation sequence stored at a client, wherein the client has a decryption key and an encryption key of an additively homomorphic cryptosystem, and the se...  
WO/2012/121634A1
In some embodiments of the invention, a method is provided in a wireless communication device (110) for transmitting an alarm signal to a radio access node (120). According to this method, the wireless communication device (110) detects ...  
WO/2012/114233A2
A method for communication includes generating one or more data streams for transmission to respective target receivers (28), and one or more jamming streams. At least one parameter, selected from a group of parameters consisting of powe...  
WO/2012/112693A1
Systems and methods in accordance with embodiments of the invention convert satellite signals to an intermediate frequency signal and selecting modulated digital data within the satellite signals for content decoding. One embodiment incl...  
WO/2012/103816A1
An apparatus comprising a plurality of stages that are coupled in series and configured to implement a hash function, wherein the stages comprise a plurality of XOR arrays and one or more Substitution-Boxes (S-Boxes) that comprise a plur...  
WO/2012/095080A1
The invention relates to a method for operating an electronic reconnaissance system (2) in surroundings that are protected by a jammer (1). Jamming phases (TJ2) for transmitting a jamming signal and monitoring phases (TB) for receiving a...  
WO/2012/095026A1
Systems and methods which provide identification of a user in combination with mutual authentication between a user and identification host are shown. Embodiments further provide mutual authentication between the identification host and ...  
WO/2012/094662A1
Peak-to-average ratio reduction is achieved by detecting peaks in an original analog signal that exceed a given threshold. Segments of the original analog signal containing such peaks are treated (e.g., by attenuation) and a composite an...  

Matches 101 - 150 out of 5,684