Abstract:
A system, method and program product for generating sound masking in an open-plan space. A method is disclosed that includes: establishing a set of acoustic criteria for the space that specifies minimum output levels at a set of specified frequencies; mixing sound samples to create an audio output stream for use as sound masking when broadcast over at least one speaker using a power amplifier; and processing the audio output stream, wherein the processing includes: analyzing the audio output stream with a spectrum analyzer to determine if the minimum output levels at the set of specified frequencies are met; and level adjusting the audio output stream with an equalizer to ensure that minimum output levels at the set of specified frequencies are met but do not exceed a given threshold above the minimum level.
Abstract:
Methods of determining whether a jamming signal strength is adequate, comprising receiving a signal, determining first and second noise power levels of the signal in first and second ranges of frequencies, the first range being broader than and encompassing the second range, and calculating a ratio of the second noise power level divided by the first noise power level. Also, methods of determining whether a jamming signal strength is adequate, comprising receiving a signal, determining a phase difference between first and second frequency range phases of the signal, and calculating a statistical mean and/or a standard deviation of the phase difference. Also, systems for determining whether a jamming signal is adequate, computer-readable media for determining whether jamming signal strength is adequate, systems comprising means for transmitting a jamming signal, and systems comprising means for transmitting and receiving waveforms to users in the presence of protective jamming.
Abstract:
A method for monitoring a selected region of an airspace associated with local area networks of computing devices is provided. The method includes providing one or more segments of a legacy local area network to be protected in a selected geographic region. The legacy local area network is characterized by an unsecured airspace within the selected geographic region. The method includes determining a security policy associated with the one or more segments of the legacy local area network. The security policy at least characterizes a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored. Additionally, the method includes connecting one or more sniffer devices into the legacy local area network. The one or more sniffer devices are spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy. Moreover, the method includes coupling a security appliance to the legacy local area network. The method also includes determining if the one or more sniffer devices substantially covers the portion of the unsecured airspace to be secured. The method additionally includes monitoring wireless activity in the airspace using the one or more sniffer devices, and automatically classifying, using a classification process, a portion of information associated with the monitoring of the wireless activity to at least determine if the wireless activity communicates to at least one of the one or more segments to be protected. Further, the method includes detecting a violation of the security policy based upon at least the classifying of the portion of the information from the monitoring of the wireless activity, and automatically processing an action associated with the violation in accordance to the security policy for the one or more segments in the legacy local area network to be protected.
Abstract:
Procédé de vérification de l'antibrouillage dans un système de communications comportant plusieurs capteurs ou antennes adaptatives caractérisé en ce qu'il comporte au moins les étapes suivantes : estimer la puissance moyenne de la sortie du système de communication, estimer les puissances respectives d'une station u, Pu, ou P'u , du bruit antenne Pa ou P'a, du bruit thermique PT, ou P'T, estimer au moins un des rapports suivants (A), (B), (C), comparer au moins un des trois rapports à une valeur seuil.
Abstract:
An example of adaptive location perturbation can include selecting, by a processing resource of a mobile device executing instructions stored on a non-transitory medium, between a plurality of localization technologies to perturb a location measurement of the mobile device. The perturbed location measurement of the mobile device can be sent to a location-based service provider.
Abstract:
Disclosed subject matter relates to techniques for predicting jamming effectiveness. In one approach, platform models and propagation models are used to predict maximum threat communication range when jamming is used and when jamming is not used. The maximum range information may then be used to calculate jammer effectiveness. In another approach, probability-based techniques are used to predict jamming effectiveness for a system of interest.
Abstract:
Beim Aufbau von Kommunikationsverbindungen in einem Ad hoc Netzwerk wird üblicherweise nach einem vorgegebenen Kommunikationsprotokoll die Identität eines Teilnehmers überprüft und ein gemeinsamer Sitzungsschlüssel für die anschließende Kommunikation vereinbart. In diesem kurzen Zeitraum erfolgt die Drahtloskommunikation über eine Funkschnittstelle in der Regel unverschlüsselt, so dass ein Angreifer die jeweiligen Nachrichten problemlos abhören kann. Zur geschützten Vereinbarung eines Sicherheitsschlüssels für eine drahtlose Kommunikationsverbindung über eine Funkschnittstelle wird daher vorgeschlagen, dass die Funkschnittstelle vor der Übertragung gemäß vorgebbaren Prüfkriterien hinsichtlich eines Vorliegens eines Störsignals überprüft wird, wobei ein Störsignal erzeugt wird, damit ein Aussenstehender, der das Störsignal nicht kennt, die übertragenen Daten nicht decodieren kann. Bei Vorliegen eines Störsignals wird die Schlüsselvereinbarungsnachricht zur Vereinbarung des Sicherheitsschlüssels verwendet. Liegt kein Störsignal vor, wird die Schlüsselvereinbarungsnachricht nicht zur Vereinbarung des Sicherheitsschlüssels verwendet. Hierdurch wird ein abhörgeschütztes Übertragen eines kryptographischen Schlüssels, eines Passworts oder allgemein eines Sicherheitsparameters über eine unverschlüsselte Funkschnittstelle ermöglicht.
Abstract:
A system includes a generator and at least one device. The generator includes a waveform oscillator and a blanking pulse generator. Each device includes a transmit antenna, a receive antenna, an antenna unit, a mixer and a detector. The antenna unit includes a receiver coupled to the receive antenna, an amplifier coupled to the receiver and a transmitter coupled to the transmit antenna and the blanking pulse generator. The mixer has inputs coupled to the amplifier and the waveform oscillator. The detector is coupled to the mixer.
Abstract:
A system includes a generator and at least one device. The generator includes a waveform oscillator and a blanking pulse generator. Each device includes a transmit antenna, a receive antenna, an antenna unit, a mixer and a detector. The antenna unit includes a receiver coupled to the receive antenna, an amplifier coupled to the receiver and a transmitter coupled to the transmit antenna and the blanking pulse generator. The mixer has inputs coupled to the amplifier and the waveform oscillator. The detector is coupled to the mixer.