Patent application number | Description | Published |
20100045522 | ANTENNA COMBINATION TECHNIQUE FOR MULTI-FREQUENCY RECEPTION - A set of receiver antennas, of which at least one of the receiver antennas has the capability of receiving frequencies that another receiver antenna from the set is incapable of receiving, is used for determining position and orientation in a navigation system. | 02-25-2010 |
20100141513 | MODULAR MULTI-FREQUENCY GNSS RECEIVER - A method and system for leveraging available navigation frequencies for determining position by creating a flexible navigation signal architecture is disclosed. Such an architecture is designed for customizing a navigation system by combining, adding, replacing or removing one or more removable RF section modules. At least one of the RF section modules has a mutually complementary frequency set with respect to a frequency set of one or more of the other RF section modules in the system. | 06-10-2010 |
20120139782 | DIFFERENTIAL CORRECTION SYSTEM ENHANCEMENT LEVERAGES ROVING RECEIVERS ENABLED FOR A NON-GPS, SECONDARY PN&T SIGNAL TO CHARACTERIZE LOCAL ERRORS - System, methods, and devices for a self-sustaining differential corrections network that employs roving reference devices (RRDs) as reference stations for improving positioning, navigation, and timing (PN&T) solutions for other enabled local roving and/or stationary receiving devices (RDs) are disclosed herein. The disclosed differential correction system enhancement leverages RRDs enabled for a non-global positioning system (non-GPS), secondary PN&T signal to characterize local errors. These local errors are then used by local RDs in combination with a signal to calculate an improved PN&T estimate for the RDs. | 06-07-2012 |
20120144451 | GEOLOCATING NETWORK NODES IN ATTENUATED ENVIRONMENTS FOR CYBER AND NETWORK SECURITY APPLICATIONS - A system and method for verifying and/or geolocating network nodes in attenuated environments for cyber and network security applications are disclosed. The system involves an origination network node, a destination network node, and at least one router network node. The origination network node is configured for transmitting a data packet to the destination network node through at least one router network node. The data packet contains a security signature portion, a routing data portion, and a payload data portion. The security signature portion comprises a listing of at least one network node that the data packet travelled through from the origination network node to the destination network node. In addition, the security signature portion comprises geolocation information, identifier information, and timing information for at least one network node in the listing. | 06-07-2012 |
20120309416 | GEOTHENTICATION BASED ON NETWORK RANGING - A system, method, and apparatus for the authentication of the physical location of a target node are disclosed herein. In one or more embodiments, the authentication of the target node's physical location is achieved by using ping ranging measurements obtained from the amount of time that elapses during ping messages being sent between the target node and at least one trusted node with a known physical location. The physical location of the trusted node(s) is obtained by using satellite geolocation techniques. The accuracy of the ranging measurements may be improved upon by using pre-coordination and/or priority determination of the ping messages being sent between the target node and the trusted node(s). In at least one embodiment, the ping messages are sent by dedicated ping response hardware that is associated with the target node and/or the trusted node(s). In some embodiments, the ping messages include a pseudo random code bit sequence. | 12-06-2012 |
20130014216 | GUARD SPOT BEAMS TO DETER SATELLITE-BASED AUTHENTICATION SYSTEM SPOOFING - A transmission-based authentication system and method to prevent an unauthorized claimant from tracking a signal are disclosed herein. In one or more embodiments, the method involves transmitting, from at least one transmission source, a plurality of authentication signals. The method further involves receiving, from at least one receiving source, a resultant signal that includes at least two of the authentication signals. Further, the method involves authenticating, with at least one authenticator device, at least one claimant by comparing properties of the resultant signal the claimant receives from the receiving source location(s) to expected properties of the resultant signal that the claimant should receive from the receiving source location(s). The properties that are compared are signal power, doppler shift, time of reception, and/or signal modulation. The transmission source(s) is employed in at least one satellite and/or at least one pseudo-satellite. | 01-10-2013 |
20130019317 | SECURE ROUTING BASED ON DEGREE OF TRUST - A system, method, and apparatus for secure routing based on a degree of trust are disclosed herein. The disclosed method involves assigning a level of trust to at least one network node, and utilizing the level of trust to determine a degree of security of the network node(s). The level of trust of the network node(s) is related to an amount of certainty of the physical location of the network node(s). The amount of certainty is attained from the network node(s) being located in a known secure location, and/or from verification of the physical location of the network node(s) by using satellite geolocation techniques or by using network ping ranging measurements. The method further involves utilizing the level of trust of the network node(s) to determine a degree of trust of at least one path for routing the data, where the path(s) includes at least one of the network nodes. | 01-17-2013 |
20130031598 | Contextual-Based Virtual Data Boundaries - A system, method, and apparatus for contextual-based virtual data boundaries are disclosed herein. In particular, the present disclosure relates to improvements in access control that work to restrict the accessibility of data based on assigning contextual data thresholds that create a virtual boundary. Specifically, the disclosed method involves assigning at least one threshold to at least one contextual criterion. The method further involves determining whether contextual information from the claimant meets at least one threshold to at least one contextual criterion. Also, the method involves authenticating the claimant, if the contextual information from the claimant meets at least one of the thresholds to at least one contextual criterion. Further, the method involves allowing the claimant access to the data, if the claimant is authenticated. | 01-31-2013 |
20130197860 | Acquisition Channel Geolocation - A method and system are disclosed for providing an estimate of a location of a user receiver device. The method involves emitting, from at least one vehicle, at least one spot beam on Earth; and receiving, with the user receiver device, at least one spot beam. The method further involves calculating, with the user receiver device, the estimate of the location of the user receiver device according to the user receiver device's location within at least one spot beam. Each spot beam contains at least one acquisition signal, which may comprise at least one ring channel. Each ring channel comprises a frame count; a space vehicle identification (SVID); a spot beam identification (ID); and/or X, Y, Z coordinates of the vehicle emitting the spot beam relative to an Earth coordinate system. In one or more embodiments, at least one vehicle may be a satellite and/or a pseudolite. | 08-01-2013 |
20130232565 | Secure Routing Based on the Physical Locations of Routers - A system, method, and apparatus for secure routing based on the physical location of routers are disclosed herein. The disclosed method for secure data transmission of at least one data packet through a plurality of network nodes involves defining a source network node, a destination network node, and at least one security constraint, which is based on the physical location of at least one of the network nodes. The method further involves comparing available network nodes with the security constraint(s) to determine which of the available network nodes meet the security constraint(s) and, thus, are qualified network nodes. Additionally, the method involves determining a route comprising at least one of the qualified network nodes to route the data packet(s) through from the source network node to the destination network node. Further, the method involves transmitting the data packet(s) through the route of the qualified network node(s). | 09-05-2013 |
20130305044 | Geothentication Based on New Network Packet Structure - A system and method for verifying and/or geolocating network nodes in a network in attenuated environments for cyber and network security applications are disclosed. The system involves an origination network node, a destination network node, and at least one router network node. The origination network node is configured for transmitting a data packet downstream to the destination network node through at least one router network node. The data packet contains a header portion and a payload data portion. At least one of the network nodes is an enabled network node. The enabled network node(s) is configured to verify any of the network nodes that are located upstream from the enabled network node(s) by analyzing the header portion and/or the payload data portion of the data packet. | 11-14-2013 |
20140247183 | SATELLITE-BASED INTEGER CYCLE AMBIGUITY RESOLUTION OF LOCAL MEDIUM WAVE RADIO SIGNALS - A system and methods for resolving integer cycle ambiguity in medium wave carrier radio signals are presented. A satellite signal is received at a receiving location and a measured code phase of the satellite signal is measured. A satellite location estimate of the receiving location is computed based on the measured code phase. Medium wave radio carrier signals from medium wave radio transmitters are received at the receiving location. A number of wavelengths of the medium wave radio carrier signals from the satellite location estimate to each of the medium wave radio transmitters is determined respectively. A carrier phase of each of the medium wave radio carrier signals is measured. An improved position estimate of the receiving location is computed based on the number of wavelengths and the carrier phase of each of the medium wave radio carrier signals, and a location of each of the medium wave radio transmitters. | 09-04-2014 |