RF FINGERPRINT SIGNAL PROCESSING DEVICE AND RF FINGERPRINT SIGNAL PROCESSING METHOD

    公开(公告)号:US20220124487A1

    公开(公告)日:2022-04-21

    申请号:US17099796

    申请日:2020-11-17

    Abstract: An RF fingerprint signal processing device configured for executing a machine learning algorithm on a plurality of input signals. The RF fingerprint signal processing device includes a receiver-feature determination circuit and a classifying determination circuit. The receiver-feature determination circuit is configured to compute on the plurality of input signals in a neural network. The classifying determination circuit is coupled with the receiver-feature determination circuit, and the classifying determination circuit is configured to send feedback information of a receiver-feature component to the receiver-feature determination circuit. The receiver-feature determination circuit decreases the receiver-feature weight of the neural network. The receiver-feature weight is associated with the receiver-feature component, and the receiver-feature weight which is decreased is applied for computing an output value of the neural network.

    INFORMATION SECURITY EARLY WARNING DEVICE AND METHOD THEREOF

    公开(公告)号:US20240129741A1

    公开(公告)日:2024-04-18

    申请号:US18056723

    申请日:2022-11-18

    CPC classification number: H04W12/122 H04L63/0236 H04W12/73

    Abstract: An information security early warning device is provided, which includes a data capturing circuit, a memory and a processor. The processor is used for running a virtual user equipment, a virtual base station and a virtual core network, and performing the following operations: when the first data flow is detected as non-malicious and abnormal, simulating transmission of the first data flow from the virtual base station to the virtual core network, and determining whether a connection can be established; when the connection can be established, updating a setting of the anomaly detection by using the first data flow; when the connection cannot be established, selecting an error log including a first malicious procedure code from multiple detection logs generated by the virtual core network; and updating the malicious feature database by using the first malicious procedure code and the first data flow.

Patent Agency Ranking