GUARD SPOT BEAMS TO DETER SATELLITE-BASED AUTHENTICATION SYSTEM SPOOFING
First Claim
1. A method for a transmission-based authentication system, the method comprising:
- transmitting, from at least one transmission source, an authentication signal and at least one guard signal;
receiving, from at least one receiving source, at least one resultant signal, wherein the at least one resultant signal includes at least one of the authentication signal and the at least one guard signal; and
authenticating, with at least one authenticator device, at least one claimant by evaluating the resultant signal the claimant receives from the receiving source.
1 Assignment
0 Petitions
Accused Products
Abstract
A transmission-based authentication system and method to prevent an unauthorized claimant from tracking a signal are disclosed herein. In one or more embodiments, the method involves transmitting, from at least one transmission source, a plurality of authentication signals. The method further involves receiving, from at least one receiving source, a resultant signal that includes at least two of the authentication signals. Further, the method involves authenticating, with at least one authenticator device, at least one claimant by comparing properties of the resultant signal the claimant receives from the receiving source location(s) to expected properties of the resultant signal that the claimant should receive from the receiving source location(s). The properties that are compared are signal power, doppler shift, time of reception, and/or signal modulation. The transmission source(s) is employed in at least one satellite and/or at least one pseudo-satellite.
-
Citations
38 Claims
-
1. A method for a transmission-based authentication system, the method comprising:
-
transmitting, from at least one transmission source, an authentication signal and at least one guard signal; receiving, from at least one receiving source, at least one resultant signal, wherein the at least one resultant signal includes at least one of the authentication signal and the at least one guard signal; and authenticating, with at least one authenticator device, at least one claimant by evaluating the resultant signal the claimant receives from the receiving source. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A transmission-based authentication system, the system comprising:
-
at least one transmitter, wherein the at least one transmitter transmits an authentication signal and at least one guard signal; at least one receiver, wherein the receiver receives at least one resultant signal, wherein the resultant signal includes at least one of the authentication signal and the guard signal; and at least one authenticator device, wherein the authenticator device authenticates at least one claimant by evaluating the resultant signal the claimant receives from the receiver. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method for a transmission-based authentication system, the method comprising:
-
transmitting, from at least one transmission source, a plurality of authentication signals; receiving, from at least one receiving source, a resultant signal that includes at least two of the authentication signals; and authenticating at least one claimant by comparing properties of the resultant signal the claimant receives from the at least one receiving source location to expected properties of the resultant signal that the claimant should receive from the at least one receiving source location. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38)
-
Specification