Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

837 results about "Eavesdropping" patented technology

Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent. The practice is widely regarded as unethical, and in many jurisdictions is illegal.

Security framework for an IP mobility system using variable-based security associations and broker redirection

In an IP-based mobile communications system, the Mobile Node changes its point of attachment to the network while maintaining network connectivity. Security concerns arise in the mobile system because authorized users are subject to the following forms of attack: (1) session stealing where a hostile node hijacks session from mobile node by redirecting packets, (2) spoofing where the identity of an authorized user is utilized in an unauthorized manner to obtain access to the network, and (3) eavesdropping and stealing of data during session with authorized user. No separate secure network exists in the IP-based mobility communications system, and therefore, it is necessary to protect information transmitted in the mobile system from the above-identified security attacks.The present invention improves the security of communications in a IP mobile communications system by creating variable-based Security Associations between various nodes on the system, a Virtual Private Network supported by an Service Level Agreement between various foreign networks and a home network, and an SLA Broker to promote large-scale roaming among different SLAs supported by the SLA Broker or agreements with other SLA Brokers.
Owner:RPX CLEARINGHOUSE

Device for acquiring physiological variables measured in a body

The present invention relates to an eavesdropping device for monitoring measured physiological variables of an individual, which eavesdropping device comprises a receiver and a communication interface. The eavesdropping device of the present invention is typically applied in a system comprising a first sensor arranged to be disposed in or outside the body of the individual for measuring aortic blood pressure Pa, and a second sensor arranged for measuring distal blood pressure Pd. Further, the system comprises a central monitoring device for monitoring the measured physiological variables and a communication link between the sensors and the central monitoring device for communicating signals representing the measured physiological variables from the sensors to the central monitoring device. The eavesdropping device is configured such that the communication interface is arranged at the communication link to communicate at least the signal representing the aortic blood pressure to a monitor of the eavesdropping device. Moreover, the receiver of the eavesdropping device is connected to the communication link, in parallel with the central monitoring device. The signal representing the aortic blood pressure Pa is communicated to the receiver via a high-impedance connection at the communication interface, and the receiver of the eavesdropping device is further arranged to receive the signal representing the measured distal blood pressure Pd from the communication link. By means of the blood pressure signals of the respective sensor, FFR can be calculated.
Owner:ST JUDE MEDICAL COORDINATION CENT

Quantum Cryptographic Communication Method

A sender (1) adds decoy photons to a secret photon having confidential information, then, subjects each photon to a different rotational manipulation, and passes the photons along a quantum channel (3) (S11 and S12). A receiver (2) receives those photons and then obtains information about the position of the decoy photons from the sender (1) through a classical channel (4). Using the information, the receiver (2) subjects each of the decoy and secret photons to a different rotational manipulation and transmits the photons in a rearranged order (S13 and S14). The receiver (1) obtains information about the position and manipulation quantities of the decoy photons from the receiver (2) and decodes the decoy photons. If the quantum state of the decoys is identical to their initial quantum state, the sender (1) determines that no eavesdropper (5) should be present (S15 and S16), cancels only the encryption of the secret photon performed by himself or herself in S12, and transmits the secret photon (S17). The receiver (2) cancels the encryption of the secret photon performed by himself or herself in S13 and thereby obtains the confidential information (S18). The present method can securely send quantum information as well as classical information such as key information, and also effectively detect eavesdropping.
Owner:NARA INSTITUTE OF SCIENCE AND TECHNOLOGY

Negotiation system and negotiation method based on quantum truly random number negotiation secret key

ActiveCN106612176AEliminate channel eavesdropping attack vectorsKey distribution for secure communicationEavesdroppingComputer science
The invention provides a negotiation system and a negotiation method based on a quantum truly random number negotiation secret key. Based on a controlled pseudo random number sequence generator and a quantum truly random number sequence generator at both ends of a link, two groups of quantum truly random number sequences are exchanged mutually by a negotiation protocol; after carrying out hash value operation, each end of the link compares the quantum truly random number sequence exchanged from the opposite end with the group of quantum truly random number sequence of the local end, which is used for exchange, to acquire position marking information with the same bit value; and one group of pseudo random number sequence is read, according to the position marking information, taking out bit values of corresponding positions one by one to form an original material bit string of the secret key, and by hash operation, a shared secret key is obtained. Compared with the prior art, a channel-eavesdropping attack channel of an opponent can be completely eliminated, and in the secret key negotiating process, any information related to the original material of the secret key is not transferred, so that the opponent cannot acquire any information related to the generated shared secret key on the basis of a channel eavesdropping or decoding means.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Directional modulation signal design method based on reverse antenna array.

The invention discloses a directional modulation signal design method based on a reverse antenna array. According to the method, the reverse antenna array is adopted to enable an incident wave phase position to conjugate and enable a digital phase shifter to construct a directional modulation signal planisphere codebook, and an expected directional modulation signal is synthesized in any spatial direction; according to the invention, a directional modulation signal transmitter and two common digital signal receivers in different spatial directions are included; the spatial direction where the legal user receiver is positioned is the expected direction, and the spatial direction where the eavesdropping receiver is positioned is the unexpected direction. A legal user can normally demodulate a received signal by utilizing the directional modulation signal transmitted through the method; however, the eavesdropping receiver cannot demodulate useful communication information even if receives signal energy similar to that of the legal user due to the dynamic distortion of a received signal planisphere. Therefore, the transmitted directional modulation signal provides a secure transmission method for wireless transmission of communication information.
Owner:NANJING UNIV OF POSTS & TELECOMM

RFID (Radio Frequency Identification Device) mutual authentication method based on secret key and cache mechanism

ActiveCN102394753AWith anti-eavesdropping performancePrevent location tracking issuesUser identity/authority verificationCo-operative working arrangementsComputer hardwareLimited resources
The invention provides an RFID (Radio Frequency Identification Device) mutual authentication method based on a secret key and a cache mechanism, which mainly solves the problems in the prior art that illegal reading, position tracking, eavesdropping, camouflage cajoling and unsafe resetting can not be resisted simultaneously. The achieving steps are as follows: a reader-writer and a tag adopt typical inquire response mechanism, the tag generates two authentication information values, namely beta is equal to hash (rl and Pr0), and sends the authentication information values to the reader-writer, the reader-writer compares received information value with self-computed information value, if the comparison results are same, returning authentication information hash (k' Pr0 and Prl') is sent to the tag through authentication. If the comparison results are different, the information is sent to back-end data base, authentication judgment is conducted by the back-end data base, the returning authentication information hash (k'' Pr0 and Prl'') is sent to the tag, after the tag receives the returning authentication information, authentication is carried out on the reader-writer by comparing the tag with self-computed value hash (k Pr0 and Prl), if the tag and the self-computed value hash (k Pr0 Prl) are same, the authentication is passed. The RFID (Radio Frequency Identification Device) mutual authentication method has the advantages of high safety performance and high execution efficiency, and can be applied to the RFID application context with limited resources and high safety requirements.
Owner:北京中科蓝信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products