CN115276993B - Anti-cheating processing method and device based on side lobe random jitter - Google Patents
Anti-cheating processing method and device based on side lobe random jitter Download PDFInfo
- Publication number
- CN115276993B CN115276993B CN202211205731.0A CN202211205731A CN115276993B CN 115276993 B CN115276993 B CN 115276993B CN 202211205731 A CN202211205731 A CN 202211205731A CN 115276993 B CN115276993 B CN 115276993B
- Authority
- CN
- China
- Prior art keywords
- time
- jitter
- information
- generating
- random jitter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J3/00—Time-division multiplex systems
- H04J3/02—Details
- H04J3/06—Synchronising arrangements
- H04J3/0602—Systems characterised by the synchronising information used
- H04J3/0605—Special codes used as synchronising signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Synchronisation In Digital Transmission Systems (AREA)
Abstract
The invention discloses a side lobe random jitter-based anti-spoofing processing method and a side lobe random jitter-based anti-spoofing processing device, wherein the method comprises the following steps of: acquiring system time; dividing the acquired system time into different time slices according to a certain time interval; generating a random jitter value according to the time slices divided by the system time; based on the jitter value, interrogation coded information is generated. The invention further enhances the randomness of identifying the inquiry signal and improves the anti-reconnaissance capability of the inquiry signal of the inquiry equipment and the anti-deception capability of the response equipment by the method of inquiring the side lobe jitter.
Description
Technical Field
The invention relates to the technical field of identification, in particular to an anti-spoofing processing method and device based on side lobe random jitter.
Background
With the rapid development of large-scale integrated circuits, the reconnaissance and deception technology is greatly developed, reconnaissance and deception equipment in various forms continuously emerges, and the reconnaissance and deception equipment performs deception on the interrogation signal reconnaissance and response equipment by utilizing the characteristics of limited jitter range of interrogation signals and fixed interrogation sidelobes, so that the effect of influencing and deception identification system normal work is achieved, and the situation perception capability of the system is further influenced. Thus, the anti-cheating capability of the identification system is improved, and the perception and the survival capability of the identification system can be improved.
In the new generation of identification systems, the following features are provided for the interrogation signal:
1. the data information of the synchronous head and the sidelobe signal of the interrogation signal is fixed prior data;
2. the interrogation signal has three jittered synchronization heads, a fixed synchronization head and two side lobe signals;
3. the jitter ranges of the three jittered synchronization signals are jittered within a fixed range.
Aiming at the characteristics of the inquiry signals, the characteristics of the inquiry signals can be detected by high-speed sampling and the characteristics of the prior data correlation, and the password information of the inquiry signals is further excavated, so that the password information of the system has risks of exposure and cracking.
For transponders of an identification system, a spoofing device may accomplish the occupation and spoofing of the transponder by snooping the interrogation signal and forwarding and simulating a large number of interrogation signals.
Disclosure of Invention
In view of this, the invention provides a side-lobe random jitter-based anti-spoofing processing method and a side-lobe random jitter-based anti-spoofing processing device, which further enhance the randomness of identifying the interrogation signal and improve the anti-snooping capability of the interrogation signal of the interrogation device and the anti-spoofing capability of the response device by the method of interrogating the side-lobe jitter.
The invention discloses a side lobe random jitter-based anti-spoofing processing method, which comprises the following steps of:
step 1: acquiring system time;
and 2, step: dividing the acquired system time into different time slices according to a certain time interval;
and step 3: generating a random jitter value according to the time slices divided by the system time;
and 4, step 4: generating inquiry coded information according to the jitter value;
the step 1 specifically comprises:
step 11: powering on and starting up a system;
step 12: starting a clock synchronization system, wherein the clock synchronization system ensures the time precision between systems;
step 13: the system time service uses the clock synchronization system as an upper computer, and transmits the acquired clock synchronization system time to a lower computer generating random jitter;
the step 2 specifically comprises:
step 21: generating random jitter, and receiving the system time of the upper computer by the lower computer;
step 22: packing the received time, dividing time slices according to the system requirements, and setting the total time asIs divided into N time slices, each time slice is;
the step 3 specifically includes:
step 31: generating random jitter, and receiving time slice information by a lower computer; in the whole system, the jitter values generated by the same time slice information are consistent;
step 32: encrypting by using the time information according to the received time slice information;
step 33: generating 5 pieces of jitter information after encryption;
step 34: and issuing jitter information.
Further, the step 4 specifically includes:
step 41: generating an encoding unit to receive the jitter information;
step 42: generating a code according to the jitter information;
step 43: and outputting the coded information.
Further, the step 42 specifically includes:
step 421: according to the received clock system time information, a lower computer which generates random jitter encrypts the system time, and generates five jitter values of S1, S2, S3, S4 and S5 according to an encryption algorithm;
step 422: an interrogation coded signal is generated based on S1, S2, S3, S4, S5.
Further, the step 422 specifically includes:
the interrogation coding signals in the identification system comprise four synchronous head signals including P1, P2, P3 and P4, two interrogation side lobes and interrogation coding information D1-Dn are formed by I1 and I2;
p1 and P4 have a fixed interval and an S1, P2 and P4 have a fixed interval and an S2, and P3 and P4 have a fixed interval and an S3;
i1 and P4 have a fixed interval and an S4, and I2 and P4 have a fixed interval and an S5;
D1-Dn and P4 have fixed time intervals respectively.
Further, still include:
p1, P2, P3, P4 and I1, I2 are prior data, after the system detects the prior data, the jitter between the synchronous head and the side signal is judged, and then the following data is detected, so as to complete the information interaction between the systems;
identifying an interrogation signal in the system, I1, I2 and P4 not jittering;
the processing method of the jitter of I1, I2 and P4 is utilized, the same time information is utilized, the difficulty of an encryption algorithm is increased, and two pieces of jitter information are increased at the same time.
Further, still include:
in the identification system, a responder judges the prior data of P1, P2, P3 and P4 and I1 and I2 at first, the data meets the requirement, and the jitter signal meets the random jitter condition generated by time slice information to start decoding;
the sidelobe signals I1 and I2 are jittered, and the responder increases the judgment condition of random jitter.
The invention also discloses a side lobe random jitter-based anti-spoofing processing device, which comprises:
the acquisition module is used for acquiring system time;
the dividing module is used for dividing the acquired system time into different time slices according to a certain time interval;
the random jitter value generating module is used for generating random jitter values according to the time slices divided by the system time;
and the inquiry coding information generating module is used for generating inquiry coding information according to the jitter value.
Due to the adoption of the technical scheme, the invention has the following advantages:
(1) The invention relates to a side lobe random jitter-based anti-spoofing processing method, which can further improve the intercepted probability of identification inquiry according to the method based on the side lobe jitter of the inquiry signal. By utilizing the processing method of the invention, a stricter communication judgment rule is established between the identification interrogator and the responder by a method of inquiring the side lobe jitter, thereby improving the anti-cheating capability of the system. Meanwhile, the number of jitters is increased by identifying the inquiry signals of the system, the password is not easy to crack, and the confidentiality of the system is improved.
(2) The anti-spoofing processing method based on the side lobe random jitter can reduce the spoofing of the identification system transponder. The identification system responder can achieve the purpose that the responder is cheated by forwarding intercepted inquiry signals or simulating a large number of inquires to occupy the processing channel of the response. By adopting the method of inquiring signal side lobe jitter, the rule of synchronous head judgment is increased, and the transponder is not easy to be deceived.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings.
Fig. 1 is a schematic flow chart of a side lobe random jitter-based anti-spoofing processing method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a receiving process for acquiring system time according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a time processing flow according to an embodiment of the present invention;
FIG. 4 is a flow chart illustrating a method for generating jitter data according to an embodiment of the present invention;
FIG. 5 is a flow chart of generating codes according to an embodiment of the present invention;
fig. 6 is a schematic diagram of encoded information according to an embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and examples, it being understood that the examples described are only some of the examples and are not intended to limit the invention to the embodiments described herein. All other embodiments available to those of ordinary skill in the art are intended to be within the scope of the embodiments of the present invention.
Aiming at the defects that the inquiry of an identification system is easy to be detected, the inquiry signal is easy to be detected, the password information of the inquiry signal is easy to be detected, and the responder of the identification system is easy to be deceived, a processing method and a device for anti-deceived based on side lobe jitter are provided.
Referring to fig. 1, the present invention provides an embodiment of an anti-spoofing processing method based on side lobe random jitter, which specifically includes the following processes:
and step 11, acquiring system time. Identifying that system time in the system is a very important parameter, and the system work is based on the system time;
and step 14, generating inquiry coded information according to the jitter value.
Fig. 2 is a specific processing flowchart of step 11, where in the identification system, the time information is particularly important, so that obtaining the time information is a primary task of the system, and in order to ensure normal operation of the system, the time information in the system needs to ensure a certain precision, otherwise, time is not synchronized, and the system cannot operate normally, and the step of obtaining the system time for the system is as follows:
and step 23, performing unified clock management on the acquired time information, judging the time precision and the time effectiveness of the acquired time, and outputting the self-checking information of the clock in time.
Fig. 3 is a detailed processing flow diagram of step 21, where the time information is particularly important in the identification system, and the steps are as follows:
Fig. 4 is a flowchart of the specific processing of step 13, which includes the following steps:
step 44: and issuing jitter information.
Fig. 5 is a flowchart of the specific processing of step 14, which includes the following specific steps:
Fig. 6 is a diagram of the encoded information of step 52, and the specific steps of step 52 are as follows:
step 61, the coding information encrypts the system time according to the received system time information, and five jitter values S1, S2, S3, S4 and S5 are generated according to an encryption algorithm;
step 62, the interrogation signal in the identification system comprises four synchronization heads (P1, P2, P3, P4), two interrogation side lobes (I1, I2) and interrogation coding information (D1-Dn);
step 63, the sync header signals P1 and P4 have a fixed interval and a jitter value S1, the sync header signals P2 and P4 have a fixed interval and a jitter value S2, and the sync header signals P3 and P4 have a fixed interval and a jitter value S3;
step 64, the sidelobe signals I1 and P4 have a fixed interval and a jitter value S4, and the sidelobe signals I2 and P4 have a fixed interval and a jitter value S5;
in step 65, the interrogation signals D1 Dn and P4 have a fixed time interval.
The method of the embodiment of the invention can also improve the probability of identifying the reconnaissance of the interrogator and the deciphered system by the method of inquiring the side lobe jitter, and improve the anti-cheating capability of the system, and comprises the following specific steps:
step 71, the synchronization head signals P1, P2, P3, P4 and the side lobe signals I1, I2 are prior data, after the system detects the prior data, the jitter between the synchronization head and the side signals is judged, then the following data is detected, and the information interaction between the systems is completed;
step 72, identifying the interrogation signal in the system, wherein the side lobe signals I1, I2 and P4 do not shake, so that the signal detection difficulty is low;
and 73, increasing the difficulty of an encryption algorithm by using a processing method of the dithering of the sidelobe signals I1, I2 and P4 and using the same time information, and simultaneously increasing two dithering information, further enhancing the random difficulty of the system and improving the anti-cheating capability of the system.
The method of the embodiment of the invention can also improve the anti-cheating capability of the transponder in the identification system by inquiring the side lobe jitter, and comprises the following specific steps:
step 81, in the identification system, the responder firstly judges the prior data of the synchronous head signals P1, P2, P3 and P4 and the side lobe signals I1 and I2, the data meets the requirement, and the decoding is started only when the jitter signal meets the jitter condition;
and step 82, dithering the side lobe signals I1 and I2, increasing judgment conditions of the transponder, increasing difficulty of simulating deception inquiry signals and enhancing deception resistance of the transponder.
The invention also provides an embodiment of a side lobe random jitter-based anti-spoofing processing device, which comprises the following steps:
the acquisition module is used for acquiring system time;
the dividing module is used for dividing the acquired system time into different time slices according to a certain time interval;
the random jitter value generating module is used for generating random jitter values according to the time slices divided by the system time;
and the inquiry coding information generating module is used for generating inquiry coding information according to the jitter value.
The method aims at the defects that the inquiry of a new generation of identification system is easy to detect, the inquiry signal is easy and the password information of the inquiry signal is easy to detect. The invention further increases the detection randomness by increasing the jitter method, can effectively reduce the defects that the inquiry is detected and the password information is exposed, and increases the confidentiality and the robustness of the system.
Aiming at the characteristics of the inquiry code of the new generation of identification system, by using the coded information after reconnaissance, the deception device can cause the answering machine of the identification system to be occupied and not to respond by forwarding and simulating the inquiry signal, so that the identification probability of the identification system is reduced, and the situation perception in a scene is influenced.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.
Claims (4)
1. A side lobe random jitter-based anti-spoofing processing method is characterized by comprising the following steps:
step 1: acquiring system time;
step 2: dividing the acquired system time into different time slices according to a certain time interval;
and step 3: generating a random jitter value according to the time slices divided by the system time;
and 4, step 4: generating inquiry coded information according to the jitter value;
the step 1 specifically comprises:
step 11: powering on a system and starting up the system;
step 12: starting a clock synchronization system, wherein the clock synchronization system ensures the time precision between systems;
step 13: the system time service uses the clock synchronization system as an upper computer, and transmits the acquired clock synchronization system time to a lower computer generating random jitter;
the step 2 specifically comprises:
step 21: generating random jitter, and receiving the system time of the upper computer by the lower computer;
step 22: packing the received time, dividing time slices according to the system requirements, and setting the total time asIs divided into N time slices, each time slice is;
the step 3 specifically comprises:
step 31: generating random jitter, and receiving time slice information by a lower computer; in the whole system, the jitter values generated by the same time slice information are consistent;
step 32: encrypting by using the time information according to the received time slice information;
step 33: generating 5 pieces of jitter information after encryption;
step 34: issuing jitter information;
the step 4 specifically comprises:
step 41: generating an encoding unit to receive the jitter information;
step 42: generating a code according to the jitter information;
step 43: outputting the coded information;
the step 42 specifically includes:
step 421: according to the received clock system time information, a lower computer which generates random jitter encrypts the system time, and generates five jitter values of S1, S2, S3, S4 and S5 according to an encryption algorithm;
step 422: generating an inquiry coded signal according to S1, S2, S3, S4 and S5;
the step 422 specifically includes:
the interrogation coding signals in the identification system comprise four synchronous head signals including P1, P2, P3 and P4, and the interrogation side lobes and the interrogation coding information D1-Dn of the two interrogation side lobes are I1 and I2;
p1 and P4 have a fixed interval and an S1, P2 and P4 have a fixed interval and an S2, and P3 and P4 have a fixed interval and an S3;
i1 and P4 have a fixed interval and an S4, and I2 and P4 have a fixed interval and an S5;
D1-Dn and P4 have fixed time intervals respectively.
2. The sidelobe-based random jitter anti-spoofing processing method of claim 1 further comprising:
p1, P2, P3, P4 and I1, I2 are prior data, after the system detects the prior data, the jitter between the synchronous head and the side signal is judged, and then the following data is detected, so as to complete the information interaction between the systems;
identifying an interrogation signal in the system, I1, I2 and P4 not jittering;
the processing method of the jitter of I1, I2 and P4 is utilized, the same time information is utilized, the difficulty of an encryption algorithm is increased, and two pieces of jitter information are increased at the same time.
3. The sidelobe-based random jitter anti-spoofing processing method of claim 2, further comprising:
in the identification system, a responder firstly judges prior data of P1, P2, P3 and P4 and I1 and I2, the data meets the requirement, and simultaneously, a jitter signal meets the random jitter condition generated by time slice information to start decoding;
the sidelobe signals I1 and I2 are jittered, and the responder increases the judgment condition of random jitter.
4. An apparatus adapted to the side lobe random jitter-based anti-spoofing processing method of any one of claims 1-3, comprising:
the acquisition module is used for acquiring system time;
the dividing module is used for dividing the acquired system time into different time slices according to a certain time interval;
the random jitter value generating module is used for generating random jitter values according to the time slices divided by the system time;
and the inquiry coding information generating module is used for generating inquiry coding information according to the jitter value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211205731.0A CN115276993B (en) | 2022-09-30 | 2022-09-30 | Anti-cheating processing method and device based on side lobe random jitter |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211205731.0A CN115276993B (en) | 2022-09-30 | 2022-09-30 | Anti-cheating processing method and device based on side lobe random jitter |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115276993A CN115276993A (en) | 2022-11-01 |
CN115276993B true CN115276993B (en) | 2022-12-13 |
Family
ID=83758068
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211205731.0A Active CN115276993B (en) | 2022-09-30 | 2022-09-30 | Anti-cheating processing method and device based on side lobe random jitter |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115276993B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5955992A (en) * | 1998-02-12 | 1999-09-21 | Shattil; Steve J. | Frequency-shifted feedback cavity used as a phased array antenna controller and carrier interference multiple access spread-spectrum transmitter |
CN112468180A (en) * | 2020-11-12 | 2021-03-09 | 四川九洲空管科技有限责任公司 | Anti-interference response method applied to friend or foe identification system |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2395404B2 (en) * | 2010-06-09 | 2021-02-24 | ABB Power Grids Switzerland AG | Secure clock synchronization |
WO2015003004A1 (en) * | 2013-07-01 | 2015-01-08 | Ess Technology, Inc. | Suppression of fixed-pattern jitter using fir filters |
CN103399303B (en) * | 2013-07-22 | 2015-09-02 | 西安电子科技大学 | Airborne radar resists intensive deceiving jamming method and system |
EP3186656B1 (en) * | 2014-08-28 | 2019-08-28 | Aveillant Limited | Radar system and associated apparatus and methods |
CN106054146B (en) * | 2016-07-04 | 2019-02-22 | 西安电子科技大学 | The airborne active pressing jamming application method of anti-major lobe suppression is cooperateed with for multistation |
CN108075877B (en) * | 2016-11-15 | 2022-04-29 | 华为技术有限公司 | Safety system and terminal chip |
DE102016015107B3 (en) * | 2016-12-20 | 2018-02-22 | Rheinmetall Air Defence Ag | Method for operating a radar system for avoiding deception by third parties |
CN106685476B (en) * | 2016-12-30 | 2019-02-12 | 北京天驰星科技有限公司 | A kind of the formation terminal and its working method of the time slot data frame of compatible data chain |
KR102084210B1 (en) * | 2019-01-04 | 2020-03-03 | 국방과학연구소 | Synchronous side lobe jamming method for electronic attack |
DE102020126431A1 (en) * | 2020-10-08 | 2022-04-14 | Rheinmetall Air Defence Ag | Method for detecting a missile equipped with surface elements made of metamaterial or "frequency selective surfaces" materials |
CN113093120B (en) * | 2021-03-15 | 2022-04-15 | 西安电子科技大学 | Method for estimating PRI agile radar target parameters based on capon algorithm |
CN114397628A (en) * | 2021-12-28 | 2022-04-26 | 北京理工大学重庆创新中心 | Radar multi-domain agile waveform design method and sparse recovery processing method thereof |
CN114978231B (en) * | 2022-07-28 | 2022-11-08 | 四川九洲空管科技有限责任公司 | Single query rapid identification method and system based on information redundancy |
CN115085748A (en) * | 2022-08-22 | 2022-09-20 | 四川九洲空管科技有限责任公司 | Method, device and equipment for resisting asynchronous interference |
-
2022
- 2022-09-30 CN CN202211205731.0A patent/CN115276993B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5955992A (en) * | 1998-02-12 | 1999-09-21 | Shattil; Steve J. | Frequency-shifted feedback cavity used as a phased array antenna controller and carrier interference multiple access spread-spectrum transmitter |
CN112468180A (en) * | 2020-11-12 | 2021-03-09 | 四川九洲空管科技有限责任公司 | Anti-interference response method applied to friend or foe identification system |
Non-Patent Citations (2)
Title |
---|
基于随机脉冲重复间隔Radon-Fourier变换的相参积累;陈潜等;《电子与信息学报》;20150515(第05期);全文 * |
雷达常见抗干扰措施的抗相参干扰性能分析;李宏等;《航天电子对抗》;20180228(第01期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN115276993A (en) | 2022-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7187267B2 (en) | Secure data tagging systems | |
Ai et al. | Nowhere to hide: Efficiently identifying probabilistic cloning attacks in large-scale RFID systems | |
US11156704B2 (en) | Method, device and system for secure distance measurement | |
KR101335210B1 (en) | Method and system for secure communication | |
JP5659082B2 (en) | Air traffic control system | |
KR20160040180A (en) | Digitally signed satellite radio-navigation signals | |
US11009608B2 (en) | GNSS authentication method | |
CN107113180B (en) | Packet transmission device, packet reception device, and storage medium | |
CN108491785B (en) | Artificial intelligence image identification attack defense system | |
CN105915346B (en) | RFID system bidirectional authentication method based on decoy state quantum randomized key | |
Caparra et al. | Feasibility and limitations of self-spoofing attacks on GNSS signals with message authentication | |
WO2018116141A1 (en) | Detection and elimination of gnss spoofing signals with pvt solution estimation | |
US5517518A (en) | Method and arrangement for recognition of a coded transmitted signal | |
Martin et al. | Information retrieval in digital watermarking | |
Lin et al. | Proactive batch authentication: Fishing counterfeit RFID tags in muddy waters | |
CN115276993B (en) | Anti-cheating processing method and device based on side lobe random jitter | |
RU2012122943A (en) | METHOD FOR SYNCHRONIZING TRANSFERRED MESSAGES | |
CN115277193A (en) | Beacon modulation method and device and electronic equipment | |
CN104091139A (en) | Q parameter acquiring method and device | |
WO2018093683A1 (en) | Systems and methods for detection of wireless beacon cloning | |
CN112087758A (en) | Detection system and method for identifying pseudo base station based on terminal position information | |
WO2016000372A1 (en) | Sequence detection method and device, and computer storage medium | |
WO2020199393A1 (en) | Anti-counterfeiting system and anti-counterfeiting method | |
US8615265B2 (en) | Coded system for radio frequency communication | |
CN111523332B (en) | RFID malicious reader detection device and reader for detecting malicious reader |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |