摘要:
Systems and methods provide for the selective prevention of data transfer from a medical device to allow the patient to have privacy when desired. These systems and methods provide medical devices that can be instructed to stop recording data and/or transmitting data to external devices and systems. These systems and methods also provide external repeater devices that can be instructed to stop recording data being received, stop forwarding data that is being or has already been received, and/or to stop soliciting data from the medical device. These systems and methods also provide for a blocking device that may be separate from the medical device and repeater to prevent data transfer such as by stopping the recording or transmission of data. The blocking device may be configured to provide a jamming signal to prevent data transmissions from being successfully communicated between the medical device and the repeater.
摘要:
The invention provides a radio frequency identification (RFID) tag. The RFID tag includes a receiving module, a judging module, and a jamming module. The judging module includes a first judging unit and a second judging unit. When a jamming function of the RFID tag is activated, the first judging unit judges whether a request signal received by the receiving module contains a reading command. If a judgment result of the judging module is positive, the second judging unit then judges whether an authorization code of the reading command is valid. If either the judgment result of the first judging unit or the second judging unit is negative, the judging module controls the jamming module to generate a radio frequency (RF) jamming signal.
摘要:
A system and method of detecting, processing, and selectively responding to radio frequency transmissions detected by at least one projectile deployed above a geographic area.
摘要:
A security system and method for mass transit and mass transportation whereby high capacity mobile vehicles such as ships, buses, planes, trains and subways transporting large numbers of passengers or cargo, are continuously monitored and secured. Sensors are utilized to detect and alert the presence of radioactive or explosive materials on board as well as within close proximity of the vehicle. Sensors are also used to identify and track cargo and people, such as drivers, operators, employees, crew, and passengers, and provide continuous location and tracking thereof from the point of initial entry to the final point of exit. Additionally, a global positioning system (GPS) provides location data, and wireless data and telecommunications link provides two-way data and voice communication with any designated remote location by using one of several modes of wireless telecommunication. Cameras provide visual observation within designated viewable areas, and may be activated by any detection of motion, and are infrared or night vision capable allowing viewing even in extremely poor light conditions. DVR recording allow a huge amount of video content from the cameras to be digitally recorded, then played back later for further analysis. Finally, the Security System may optionally have an Internet Protocol (IP) address thereby allowing authorized persons to access the system from secured Internet connection.
摘要:
The present invention relates to a mobile jamming attack method applied in a wireless sensor network (WSN) and method defending the same. The mobile jamming attack method is a power exhaustion denial-of-service attack, possesses mobility and self-learning capability and is unable to be defended with existing defending scheme due to its attack to the routing layer of the WSN; the mobile jamming defending method employs multi-topologies scheme to defend the mobile jamming attack so that the affected area is reduced, the base station can still receive reply packets under the attack, and the jammed area can be roughly located and the track of the mobile jammer can be traced.
摘要:
The present invention comprises a device that, based upon signals transmitted by devices within a wireless network, causes masking signals to be selectively transmitted. For example, the device may not cause masking signals to be transmitted if the signal does not include confidential data, for example it is an acknowledgement message. Additionally, the strength, coding rate and modulation format of the masking signals may be varied to provide increased data security.
摘要:
Apparatus forming a portable charge, debit or similar identification card which can be read using a magnetic card reader and methods for securing information are described. The preferred apparatus includes a magnetic stripe for storing information, a jamming assembly configured to emit a jamming signal which temporarily renders at least a portion of the magnetic stripe unreadable when the card is swiped through the card reader without first entering correct authentication data, and a power source adapted to supply power to the jamming assembly. Other features are also disclosed.
摘要:
A method and a circuit for scrambling the current signature of a load including at least one integrated circuit executing digital processings, including the step of, at least on the load ground side, combining a current absorbed by a first linear regulator with a current absorbed by at least one capacitive switched-mode circuit with one or several switched capacitances.
摘要:
In an aspect of the present invention, an individual carries a mobile communications device, such as a cell phone, that listens for readers attempting to read tags associated with the individual. In a further aspect of the present invention, the mobile communications device operates to mask the transmissions of these readers, to prevent them from reading the tags.
摘要:
Some demonstrative embodiments of the invention include methods, devices and/or systems to secure a wireless transmission. The method may include, for example, transmitting a noise transmission to be received by one or more destinations other than an intended destination of a packet during a time period corresponding to a duration of the packet. Other embodiments are described and claimed.