CN115276993A - Anti-cheating processing method and device based on side lobe random jitter - Google Patents

Anti-cheating processing method and device based on side lobe random jitter Download PDF

Info

Publication number
CN115276993A
CN115276993A CN202211205731.0A CN202211205731A CN115276993A CN 115276993 A CN115276993 A CN 115276993A CN 202211205731 A CN202211205731 A CN 202211205731A CN 115276993 A CN115276993 A CN 115276993A
Authority
CN
China
Prior art keywords
time
jitter
information
generating
random jitter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211205731.0A
Other languages
Chinese (zh)
Other versions
CN115276993B (en
Inventor
程旗
吴晓华
冯涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Jiuzhou ATC Technology Co Ltd
Original Assignee
Sichuan Jiuzhou ATC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Jiuzhou ATC Technology Co Ltd filed Critical Sichuan Jiuzhou ATC Technology Co Ltd
Priority to CN202211205731.0A priority Critical patent/CN115276993B/en
Publication of CN115276993A publication Critical patent/CN115276993A/en
Application granted granted Critical
Publication of CN115276993B publication Critical patent/CN115276993B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/06Synchronising arrangements
    • H04J3/0602Systems characterised by the synchronising information used
    • H04J3/0605Special codes used as synchronising signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Synchronisation In Digital Transmission Systems (AREA)

Abstract

The invention discloses a side lobe random jitter-based anti-spoofing processing method and a side lobe random jitter-based anti-spoofing processing device, wherein the method comprises the following steps of: acquiring system time; dividing the acquired system time into different time slices according to a certain time interval; generating a random jitter value according to the time slices divided by the system time; based on the jitter value, the challenge code information is generated. The invention further enhances the randomness of identifying the inquiry signal and improves the anti-reconnaissance capability of the inquiry signal of the inquiry equipment and the anti-deception capability of the response equipment by the method of inquiring the side lobe jitter.

Description

Anti-cheating processing method and device based on side lobe random jitter
Technical Field
The invention relates to the technical field of identification, in particular to an anti-spoofing processing method and device based on side lobe random jitter.
Background
With the rapid development of large-scale integrated circuits, the reconnaissance and deception technology is greatly developed, reconnaissance and deception equipment in various forms continuously emerges, and the reconnaissance and deception equipment performs deception on the interrogation signal reconnaissance and response equipment by utilizing the characteristics of limited jitter range of interrogation signals and fixed interrogation sidelobes, so that the effect of influencing and deception identification system normal work is achieved, and the situation perception capability of the system is further influenced. Thus, the anti-cheating capability of the identification system is improved, and the perception and the survival capability of the identification system can be improved.
In the new generation of identification systems, the following features are provided for the interrogation signal:
1. the data information of the synchronous head and the side lobe signal of the interrogation signal is fixed prior data;
2. the interrogation signal has three jittered synchronization heads, a fixed synchronization head and two side lobe signals;
3. the jitter ranges of the three jittered synchronization signals are jittered within a fixed range.
Aiming at the characteristics of the inquiry signals, the characteristics of the inquiry signals can be detected by high-speed sampling and the characteristics of the prior data correlation, and the password information of the inquiry signals is further excavated, so that the password information of the system has risks of exposure and cracking.
For transponders of an identification system, a spoofing device may accomplish the occupation and spoofing of the transponder by snooping the interrogation signal and forwarding and simulating a large number of interrogation signals.
Disclosure of Invention
In view of this, the invention provides a side-lobe random jitter-based anti-spoofing processing method and a side-lobe random jitter-based anti-spoofing processing device, which further enhance the randomness of identifying the interrogation signal and improve the anti-snooping capability of the interrogation signal of the interrogation device and the anti-spoofing capability of the response device by the method of interrogating the side-lobe jitter.
The invention discloses a side lobe random jitter-based anti-spoofing processing method, which comprises the following steps of:
step 1: acquiring system time;
step 2: dividing the acquired system time into different time slices according to a certain time interval;
and step 3: generating a random jitter value according to the time slices divided by the system time;
and 4, step 4: generating inquiry coding information according to the jitter value;
the step 1 specifically comprises:
step 11: powering on and starting up a system;
step 12: starting a clock synchronization system, wherein the clock synchronization system ensures the time precision between systems;
step 13: the system time service takes the clock synchronization system as an upper computer, and transmits the acquired clock synchronization system time to a lower computer which generates random jitter;
the step 2 specifically comprises:
step 21: generating random jitter, and receiving the system time of the upper computer by the lower computer;
step 22: packing the received time, dividing time slices according to the system requirement, and setting the total time as
Figure 782372DEST_PATH_IMAGE001
Is divided into N time slices, each time slice is
Figure 599018DEST_PATH_IMAGE002
Step 23: each time slice passes
Figure 195084DEST_PATH_IMAGE003
Issuing time slice information once;
the step 3 specifically includes:
step 31: generating random jitter, and receiving time slice information by the lower computer; in the whole system, the jitter values generated by the same time slice information are consistent;
step 32: encrypting by using the time information according to the received time slice information;
step 33: generating 5 pieces of jitter information after encryption;
step 34: and issuing jitter information.
Further, the step 4 specifically includes:
step 41: generating an encoding unit to receive the jitter information;
step 42: generating a code according to the jitter information;
step 43: and outputting the coded information.
Further, the step 42 specifically includes:
step 421: according to the received clock system time information, a lower computer which generates random jitter encrypts the system time, and generates five jitter values of S1, S2, S3, S4 and S5 according to an encryption algorithm;
step 422: an interrogation coded signal is generated based on S1, S2, S3, S4, S5.
Further, the step 422 specifically includes:
the interrogation coding signals in the identification system comprise four synchronous head signals including P1, P2, P3 and P4, two interrogation side lobes and interrogation coding information D1-Dn are formed by I1 and I2;
p1 and P4 have a fixed interval and an S1, P2 and P4 have a fixed interval and an S2, P3 and P4 have a fixed interval and an S3;
i1 and P4 have a fixed interval and an S4, and I2 and P4 have a fixed interval and an S5;
D1-Dn and P4 have fixed time intervals respectively.
Further, the method also comprises the following steps:
p1, P2, P3, P4 and I1, I2 are prior data, after the system detects the prior data, the jitter between the synchronous head and the side signal is judged, and then the following data is detected, so as to complete the information interaction between the systems;
identifying an interrogation signal in the system, I1, I2 and P4 not jittering;
the processing method of the jitter of I1, I2 and P4 is utilized, the same time information is utilized, the difficulty of an encryption algorithm is increased, and two pieces of jitter information are increased at the same time.
Further, the method also comprises the following steps:
in the identification system, a responder judges the prior data of P1, P2, P3 and P4 and I1 and I2 at first, the data meets the requirement, and the jitter signal meets the random jitter condition generated by time slice information to start decoding;
the sidelobe signals I1 and I2 are jittered, and the responder increases the judgment condition of random jitter.
The invention also discloses a side lobe random jitter-based anti-spoofing processing device, which comprises:
the acquisition module is used for acquiring system time;
the dividing module is used for dividing the acquired system time into different time slices according to a certain time interval;
the random jitter value generating module is used for generating random jitter values according to the time slices divided by the system time;
and the inquiry coding information generating module is used for generating inquiry coding information according to the jitter value.
Due to the adoption of the technical scheme, the invention has the following advantages:
(1) The invention relates to a side lobe random jitter-based anti-spoofing processing method, which can further improve the intercepted probability of identification inquiry according to the method based on the side lobe jitter of the inquiry signal. By utilizing the processing method of the invention, a stricter communication judgment rule is established between the identification interrogator and the responder by the method of inquiring the side lobe jitter, and the anti-cheating capability of the system is improved. Meanwhile, the number of jitters is increased by identifying the inquiry signals of the system, the password is not easy to crack, and the confidentiality of the system is improved.
(2) The anti-spoofing processing method based on the side lobe random jitter is designed, and spoofing of a transponder of an identification system can be reduced. The identification system responder can achieve the aim that the responder is cheated by forwarding intercepted inquiry signals or simulating a large number of inquires to occupy the processing channel of the response. By adopting the method of interrogation signal sidelobe jitter, the rule of synchronous head judgment is increased, and the responder is not easy to be deceived.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments described in the embodiments of the present invention, and it is obvious for those skilled in the art that other drawings may be obtained according to the drawings.
Fig. 1 is a schematic flow chart of a side lobe random jitter-based anti-spoofing processing method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a receiving process for obtaining system time according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a time processing flow according to an embodiment of the present invention;
FIG. 4 is a flow chart illustrating a method for generating jitter data according to an embodiment of the present invention;
FIG. 5 is a flow chart illustrating the generation of codes according to an embodiment of the present invention;
fig. 6 is a schematic diagram of encoded information according to an embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and examples, it being understood that the examples described are only some of the examples and are not intended to limit the invention to the embodiments described herein. All other embodiments available to those of ordinary skill in the art are intended to be within the scope of the embodiments of the present invention.
Aiming at the defects that the inquiry of an identification system is easy to be detected, the inquiry signal and the password information of the inquiry signal are easy to be detected, and the responder of the identification system is easy to be cheated, the anti-cheating processing method and the anti-cheating processing device based on the sidelobe jitter are provided.
Referring to fig. 1, the present invention provides an embodiment of an anti-spoofing processing method based on side lobe random jitter, which specifically includes the following processes:
and step 11, acquiring system time. Identifying that system time in a system is a very important parameter, wherein system work is based on the system time;
step 12, dividing time into different time slices according to a certain time interval according to the acquired system clock;
step 13, generating a random jitter value according to the time slices divided by the system time;
and step 14, generating inquiry coded information according to the jitter value.
Fig. 2 is a specific processing flowchart of step 11, where in the identification system, the time information is particularly important, so that obtaining the time information is a primary task of the system, and in order to ensure normal operation of the system, the time information in the system needs to ensure a certain precision, otherwise, time is not synchronized, and the system cannot operate normally, and the step of obtaining the system time for the system is as follows:
step 21, starting a system, and starting a working process of each system after the system is powered on;
step 22, a clock synchronization system is started, the clock synchronization system utilizes the stored time information or obtains the time information through an upper computer, and the accuracy of the time information is ensured through multiple time service due to the fact that the system time is the basis of the system;
and step 23, performing unified clock management on the acquired time information, judging the time precision and the time effectiveness of the acquired time, and outputting the self-checking information of the clock in time.
Fig. 3 is a detailed processing flow diagram of step 21, where the time information is particularly important in the identification system, and the steps are as follows:
step 31, receiving system time of an upper computer, wherein the upper computer receives the obtained system time in a reliable transmission mode;
step 32, packing the received time, dividing time slices according to the system requirements, and dividing the total time of a certain time period
Figure 515207DEST_PATH_IMAGE001
Is divided into N time slices, each time slice is
Figure 413893DEST_PATH_IMAGE004
Step 33, every time a time slice passes
Figure 655519DEST_PATH_IMAGE003
And the next time slice information.
Fig. 4 is a flowchart of the specific processing of step 13, which includes the following steps:
step 41, receiving time slice information;
step 42, encrypting by using the time information according to the received time slice information;
step 43, generating 5 pieces of jitter information after encryption;
step 44: and issuing jitter information.
Fig. 5 is a flowchart of the specific processing of step 14, which includes the following steps:
step 51, receiving jitter information;
step 52, generating codes according to the jitter information;
step 53, outputting the encoded information.
Fig. 6 is a diagram of the encoded information of step 52, and the specific steps of step 52 are as follows:
step 61, the coding information encrypts the system time according to the received system time information, and five jitter values S1, S2, S3, S4 and S5 are generated according to an encryption algorithm;
step 62, the interrogation signal in the identification system comprises four synchronization heads (P1, P2, P3, P4), two interrogation side lobes (I1, I2) and interrogation coding information (D1-Dn);
step 63, the sync header signals P1 and P4 have a fixed interval and a jitter value S1, the sync header signals P2 and P4 have a fixed interval and a jitter value S2, and the sync header signals P3 and P4 have a fixed interval and a jitter value S3;
step 64, the sidelobe signals I1 and P4 have a fixed interval and a jitter value S4, and the sidelobe signals I2 and P4 have a fixed interval and a jitter value S5;
in step 65, the interrogation signals D1-Dn and P4 have a fixed time interval.
The method of the embodiment of the invention can also improve the probability of identifying the reconnaissance of the interrogator and the decoding of the system by the method of inquiring the side lobe jitter, and improve the anti-cheating capability of the system, and comprises the following specific steps:
step 71, the synchronization head signals P1, P2, P3, P4 and the side lobe signals I1, I2 are prior data, after the system detects the prior data, the jitter between the synchronization head and the side signals is judged, then the following data is detected, and the information interaction between the systems is completed;
step 72, identifying the interrogation signal in the system, wherein the side lobe signals I1, I2 and P4 do not shake, so that the signal detection difficulty is low;
and 73, increasing the difficulty of an encryption algorithm by using a processing method of the dithering of the sidelobe signals I1, I2 and P4 and using the same time information, and simultaneously increasing two dithering information, further enhancing the random difficulty of the system and improving the anti-cheating capability of the system.
The method of the embodiment of the invention can also improve the anti-cheating capability of the transponder in the identification system by inquiring the side lobe jitter, and comprises the following specific steps:
step 81, in the identification system, the responder firstly judges the prior data of the synchronous head signals P1, P2, P3 and P4 and the side lobe signals I1 and I2, the data meets the requirement, and the decoding is started only when the jitter signal meets the jitter condition;
and step 82, dithering the side lobe signals I1 and I2, increasing judgment conditions of the responder, increasing difficulty of simulating deception inquiry signals and enhancing the deception resistance of the responder.
The invention also provides an embodiment of a side lobe random jitter-based anti-spoofing processing device, which comprises the following steps:
the acquisition module is used for acquiring system time;
the dividing module is used for dividing the acquired system time into different time slices according to a certain time interval;
the random jitter value generating module is used for generating random jitter values according to the time slices divided by the system time;
and the inquiry coding information generating module is used for generating inquiry coding information according to the jitter value.
The method aims at the defects that the inquiry of a new generation of identification system is easy to detect, the inquiry signal is easy and the password information of the inquiry signal is easy to detect. The invention further increases the detection randomness by increasing the jitter method, can effectively reduce the defects that the inquiry is detected and the password information is exposed, and increases the confidentiality and the robustness of the system.
Aiming at the characteristics of the inquiry code of the new generation of identification system, by using the coded information after reconnaissance, the deception device can cause the answering machine of the identification system to be occupied and not to respond by forwarding and simulating the inquiry signal, so that the identification probability of the identification system is reduced, and the situation perception in a scene is influenced.
Finally, it should be noted that: although the present invention has been described in detail with reference to the above embodiments, it should be understood by those skilled in the art that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.

Claims (7)

1. A side lobe random jitter-based anti-spoofing processing method is characterized by comprising the following steps:
step 1: acquiring system time;
and 2, step: dividing the acquired system time into different time slices according to a certain time interval;
and step 3: generating a random jitter value according to the time slices divided by the system time;
and 4, step 4: generating inquiry coded information according to the jitter value;
the step 1 specifically comprises:
step 11: powering on and starting up a system;
step 12: starting a clock synchronization system, wherein the clock synchronization system ensures the time precision between systems;
step 13: the system time service uses the clock synchronization system as an upper computer, and transmits the acquired clock synchronization system time to a lower computer generating random jitter;
the step 2 specifically comprises:
step 21: generating random jitter, and receiving the system time of the upper computer by the lower computer;
step 22: packing the received time, dividing time slices according to the system requirement, and setting the total time as
Figure 650263DEST_PATH_IMAGE001
Is divided into N time slices, each time slice is
Figure 318005DEST_PATH_IMAGE002
Step 23: each time slice passes
Figure 252463DEST_PATH_IMAGE003
Issuing time slice information once;
the step 3 specifically includes:
step 31: generating random jitter, and receiving time slice information by the lower computer; in the whole system, the jitter values generated by the same time slice information are consistent;
step 32: encrypting by using the time information according to the received time slice information;
step 33: generating 5 pieces of jitter information after encryption;
step 34: and issuing jitter information.
2. The sidelobe-based random jitter anti-spoofing processing method of claim 1, wherein the step 4 specifically comprises:
step 41: generating an encoding unit to receive the jitter information;
step 42: generating a code according to the jitter information;
step 43: and outputting the coded information.
3. The sidelobe-based random jitter anti-spoofing processing method of claim 2, wherein the step 42 specifically comprises:
step 421: according to the received clock system time information, a lower computer which generates random jitter encrypts the system time, and generates five jitter values of S1, S2, S3, S4 and S5 according to an encryption algorithm;
step 422: an interrogation coded signal is generated based on S1, S2, S3, S4, S5.
4. The sidelobe-based random jitter anti-spoofing processing method of claim 3, wherein said step 422 specifically comprises:
the interrogation coding signals in the identification system comprise four synchronous head signals including P1, P2, P3 and P4, and the interrogation side lobes and the interrogation coding information D1-Dn of the two interrogation side lobes are I1 and I2;
p1 and P4 have a fixed interval and an S1, P2 and P4 have a fixed interval and an S2, and P3 and P4 have a fixed interval and an S3;
i1 and P4 have a fixed interval and an S4, and I2 and P4 have a fixed interval and an S5;
D1-Dn and P4 have fixed time intervals respectively.
5. The sidelobe-based random jitter anti-spoofing processing method of claim 4 further comprising:
p1, P2, P3, P4 and I1, I2 are prior data, after the system detects the prior data, the jitter between the synchronous head and the side signal is judged, and then the following data is detected, so as to complete the information interaction between the systems;
identifying an interrogation signal in the system, I1, I2 and P4 not jittering;
the processing method of the jitter of I1, I2 and P4 is utilized, the same time information is utilized, the difficulty of an encryption algorithm is increased, and two pieces of jitter information are increased at the same time.
6. The sidelobe-based random jitter anti-spoofing processing method of claim 5, further comprising:
in the identification system, a responder firstly judges prior data of P1, P2, P3 and P4 and I1 and I2, the data meets the requirement, and simultaneously, a jitter signal meets the random jitter condition generated by time slice information to start decoding;
the sidelobe signals I1 and I2 are jittered, and the responder increases the judgment condition of random jitter.
7. An anti-spoofing processing device based on side lobe random jitter is characterized by comprising:
the acquisition module is used for acquiring system time;
the dividing module is used for dividing the acquired system time into different time slices according to a certain time interval;
the random jitter value generating module is used for generating random jitter values according to the time slices divided by the system time;
and the inquiry coding information generating module is used for generating inquiry coding information according to the jitter value.
CN202211205731.0A 2022-09-30 2022-09-30 Anti-cheating processing method and device based on side lobe random jitter Active CN115276993B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211205731.0A CN115276993B (en) 2022-09-30 2022-09-30 Anti-cheating processing method and device based on side lobe random jitter

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211205731.0A CN115276993B (en) 2022-09-30 2022-09-30 Anti-cheating processing method and device based on side lobe random jitter

Publications (2)

Publication Number Publication Date
CN115276993A true CN115276993A (en) 2022-11-01
CN115276993B CN115276993B (en) 2022-12-13

Family

ID=83758068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211205731.0A Active CN115276993B (en) 2022-09-30 2022-09-30 Anti-cheating processing method and device based on side lobe random jitter

Country Status (1)

Country Link
CN (1) CN115276993B (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5955992A (en) * 1998-02-12 1999-09-21 Shattil; Steve J. Frequency-shifted feedback cavity used as a phased array antenna controller and carrier interference multiple access spread-spectrum transmitter
CN103399303A (en) * 2013-07-22 2013-11-20 西安电子科技大学 Method and system for resisting dense forwarding type defraud interference of airborne radar
US20150003575A1 (en) * 2013-07-01 2015-01-01 Ess Technology, Inc. Suppression of Fixed-Pattern Jitter Using FIR Filters
WO2016030656A1 (en) * 2014-08-28 2016-03-03 Aveillant Limited Radar system and associated apparatus and methods
CN106054146A (en) * 2016-07-04 2016-10-26 西安电子科技大学 On-plane active blanket jamming application method for aiming at multi-station cooperated main lobe jamming prevention
EP3339876A1 (en) * 2016-12-20 2018-06-27 Rheinmetall Air Defence AG Method for operating a radar system for preventing deception by third parties
CN106685476B (en) * 2016-12-30 2019-02-12 北京天驰星科技有限公司 A kind of the formation terminal and its working method of the time slot data frame of compatible data chain
US20190266359A1 (en) * 2016-11-15 2019-08-29 Huawei Technologies Co., Ltd. Security system and terminal chip
US20200217927A1 (en) * 2019-01-04 2020-07-09 Agency For Defense Development Synchronous side lobe jamming method for electronic attack
EP2395404B2 (en) * 2010-06-09 2021-02-24 ABB Power Grids Switzerland AG Secure clock synchronization
CN112468180A (en) * 2020-11-12 2021-03-09 四川九洲空管科技有限责任公司 Anti-interference response method applied to friend or foe identification system
WO2022074218A1 (en) * 2020-10-08 2022-04-14 Rheinmetall Air Defence Ag Method for detecting a missile equipped with surface elements made of metamaterial or "frequency-selective surface" materials
CN113093120B (en) * 2021-03-15 2022-04-15 西安电子科技大学 Method for estimating PRI agile radar target parameters based on capon algorithm
CN114397628A (en) * 2021-12-28 2022-04-26 北京理工大学重庆创新中心 Radar multi-domain agile waveform design method and sparse recovery processing method thereof
CN114978231A (en) * 2022-07-28 2022-08-30 四川九洲空管科技有限责任公司 Single query rapid identification method and system based on information redundancy
CN115085748A (en) * 2022-08-22 2022-09-20 四川九洲空管科技有限责任公司 Method, device and equipment for resisting asynchronous interference

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5955992A (en) * 1998-02-12 1999-09-21 Shattil; Steve J. Frequency-shifted feedback cavity used as a phased array antenna controller and carrier interference multiple access spread-spectrum transmitter
EP2395404B2 (en) * 2010-06-09 2021-02-24 ABB Power Grids Switzerland AG Secure clock synchronization
US20150003575A1 (en) * 2013-07-01 2015-01-01 Ess Technology, Inc. Suppression of Fixed-Pattern Jitter Using FIR Filters
CN103399303A (en) * 2013-07-22 2013-11-20 西安电子科技大学 Method and system for resisting dense forwarding type defraud interference of airborne radar
WO2016030656A1 (en) * 2014-08-28 2016-03-03 Aveillant Limited Radar system and associated apparatus and methods
CN106054146A (en) * 2016-07-04 2016-10-26 西安电子科技大学 On-plane active blanket jamming application method for aiming at multi-station cooperated main lobe jamming prevention
US20190266359A1 (en) * 2016-11-15 2019-08-29 Huawei Technologies Co., Ltd. Security system and terminal chip
EP3339876A1 (en) * 2016-12-20 2018-06-27 Rheinmetall Air Defence AG Method for operating a radar system for preventing deception by third parties
CN106685476B (en) * 2016-12-30 2019-02-12 北京天驰星科技有限公司 A kind of the formation terminal and its working method of the time slot data frame of compatible data chain
US20200217927A1 (en) * 2019-01-04 2020-07-09 Agency For Defense Development Synchronous side lobe jamming method for electronic attack
WO2022074218A1 (en) * 2020-10-08 2022-04-14 Rheinmetall Air Defence Ag Method for detecting a missile equipped with surface elements made of metamaterial or "frequency-selective surface" materials
CN112468180A (en) * 2020-11-12 2021-03-09 四川九洲空管科技有限责任公司 Anti-interference response method applied to friend or foe identification system
CN113093120B (en) * 2021-03-15 2022-04-15 西安电子科技大学 Method for estimating PRI agile radar target parameters based on capon algorithm
CN114397628A (en) * 2021-12-28 2022-04-26 北京理工大学重庆创新中心 Radar multi-domain agile waveform design method and sparse recovery processing method thereof
CN114978231A (en) * 2022-07-28 2022-08-30 四川九洲空管科技有限责任公司 Single query rapid identification method and system based on information redundancy
CN115085748A (en) * 2022-08-22 2022-09-20 四川九洲空管科技有限责任公司 Method, device and equipment for resisting asynchronous interference

Non-Patent Citations (9)

* Cited by examiner, † Cited by third party
Title
MEHRDAD SOUMEKH: "SAR-ECCM USING PHASE-PERTURBED LFM CHIRP SIGNALS AND DRFM REPEAT JAMMER PENALIZATION", 《IEEE INTERNATIONAL RADAR CONFERENCE, 2005.》 *
李光明等: "智能多波束干扰技术研究", 《电光与控制》 *
李可达: "现代雷达基本抗干扰技术", 《航天电子对抗》 *
李宏等: "雷达常见抗干扰措施的抗相参干扰性能分析", 《航天电子对抗》 *
李江源等: "利用复杂调制LFM信号的SAR抗欺骗干扰技术", 《电子与信息学报》 *
祁萍萍,李琦,韩壮志: "基于RFT的随机调频周期LFMCW雷达微弱目标检测", 《测控遥感与导航定位》 *
蔡晓霞等: "JTIDS信号对抗技术研究", 《航天电子对抗》 *
郁春来等: "欺骗干扰信号中多普勒频率变化率测量技术研究", 《信号处理》 *
陈潜等: "基于随机脉冲重复间隔Radon-Fourier变换的相参积累", 《电子与信息学报》 *

Also Published As

Publication number Publication date
CN115276993B (en) 2022-12-13

Similar Documents

Publication Publication Date Title
US7187267B2 (en) Secure data tagging systems
US7497384B2 (en) Methods and systems for the negotiation of a population of RFID tags with improved security
US8390431B1 (en) RFID tags that backscatter more codes
Ai et al. Nowhere to hide: Efficiently identifying probabilistic cloning attacks in large-scale RFID systems
US8907766B2 (en) Method and system for secure communication
US11156704B2 (en) Method, device and system for secure distance measurement
JP2011242398A (en) Mode 5 detection process using phase and amplitude correlation
CN102711109A (en) Method for performing identity authentication on mobile terminal
Chen et al. Probabilistic detection of missing tags for anonymous multicategory RFID systems
Caparra et al. Feasibility and limitations of self-spoofing attacks on GNSS signals with message authentication
Lin et al. Proactive batch authentication: Fishing counterfeit RFID tags in muddy waters
CN115276993B (en) Anti-cheating processing method and device based on side lobe random jitter
US11585943B2 (en) Detection and elimination of GNSS spoofing signals with PVT solution estimation
Carroccia et al. Inducing collisions for fast RFID tag identification
CN115277193A (en) Beacon modulation method and device and electronic equipment
CN104091139A (en) Q parameter acquiring method and device
US9338587B2 (en) System and method for radio-tagging radio transmitters
CN112087758A (en) Detection system and method for identifying pseudo base station based on terminal position information
WO2016000372A1 (en) Sequence detection method and device, and computer storage medium
CN111523332B (en) RFID malicious reader detection device and reader for detecting malicious reader
CN115277084B (en) Electronic information unidirectional transmission system and method for signal shielding
Jin et al. An Enhanced Collision Detection Scheme for ISO 18000–6C RFID Systems
US11824761B1 (en) Identifying alignment markers using partial correlators
CN109995745B (en) Information matching method, terminal and computer readable storage medium
Liu et al. A Novel and Efficient Blocking Scheme for Multiple Tag Identifications in a Large Scale RFID System.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant