This document incorporates, in their entirety, by reference the disclosures and/or teachings of the following documents: U.S. Pat. No. 7,515,094 B2 issued on Apr. 7, 2009 and entitled “Advanced electromagnetic location of electronic equipment”; U.S. Pat. No. 8,063,813 B1 issued on Nov. 22, 2011 and entitled “Active improvised explosive device (IED) electronic signature detection”; U.S. Pat. No. 8,537,050 B2 issued on Sep. 17, 2013 and entitled “Identification and analysis of source emissions through harmonic phase comparison”; U.S. Pat. No. 8,643,539 B2 issued on Feb. 4, 2014 and entitled “Advance manufacturing monitoring and diagnostic tool”; U.S. Pat. No. 8,825,823 B2 issued on Sep. 2, 2014 and entitled “System and method for physically detecting, identifying, diagnosing and geolocating electronic devices connectable to a network”; U.S. Pat. No. 9,205,270 B2 issued on Dec. 8, 2015 and entitled “METHOD AND APPARATUS FOR THE DIAGNOSIS AND PROGNOSIS OF ACTIVE IMPLANTS IN OR ATTACHED TO BIOLOGICAL HOSTS OR SYSTEMS”; U.S. Pat. No. 9,059,189 B2 issued on Jun. 16, 2015 and entitled “INTEGRATED CIRCUIT WITH ELECTROMAGNETIC ENERGY ANOMALY DETECTION AND PROCESSING”; U.S. Pub. No. 20120226463 A1 published on Sep. 6, 2012 and entitled “SYSTEM AND METHOD FOR PHYSICALLY DETECTING COUNTERFEIT ELECTRONICS”, now issued as U.S. Pat. No. 10,475,754 B2 on Nov. 12, 2019; U.S. Pat. No. 9,658,314 B2 issued on May 23, 2017 and entitled “SYSTEM AND METHOD FOR GEO-LOCATING AND DETECTING SOURCE OF ELECTROMAGNETIC EMISSIONS”; U.S. Pub. No. 20130328710 A1 published on Dec. 12, 2013 and entitled “IDENTIFICATION AND ANALYSIS OF SOURCE EMISSIONS THROUGH HARMONIC PHASE COMPARISON”, now issued as U.S. Pat. No. 10,416,286 B2 on Sep. 17, 2019; U.S. Pat. No. 9,285,463 B1 issued on Mar. 15, 2016 and entitled “Method and Apparatus for Battle Damage Assessment of Electric or electronic Devices and Systems”; U.S. Pat. No. 9,851,386 B2 issued on Dec. 26, 2017 and entitled “Method and Apparatus for Detection and Identification of Counterfeit and Substandard Electronics”, U.S. Pat. No. 9,797,993 B2 issued on Oct. 24, 2017 and entitled “Advance Manufacturing Monitoring and Diagnostic Tool”; PCT Pub. No. WO2015/134148 A1 published on Sep. 11, 2015 and entitled “METHOD AND APPARATUS FOR DETECTION AND IDENTIFICATION OF COUNTERFEIT AND SUBSTANDARD ELECTRONICS”, U.S. Pat. No. 9,562,962 B2 issued on Feb. 7, 2017 and entitled “System and Method for Physically Detecting, Identifying, Diagnosing and Geolocating Electronic Devices Connectable to a Network”; and U.S. Pub. No. 20160098561 A1 published on Apr. 7, 2016 and entitled “DETECTION OF MALICIOUS SOFTWARE, FIRMWARE, IP CORES AND CIRCUITRY VIA UNINTENDED EMISSIONS”, now issued as U.S. Pat. No. 10,395,032 B2 on Aug. 27, 2019.
N/A
N/A
The subject matter relates to protection of electronic devices. The subject matter may relate to protection of medical electronic devices connected to a data bus or network. The subject further matter may relate to medical electronic devices protection from cyber and cyber-physical attacks.
The following background information may present examples of specific aspects of the prior art (e.g., without limitation, approaches, facts, or common wisdom) that, while expected to be helpful to further educate the reader as to additional aspects of the prior art, is not to be construed as limiting the present subject matter, or any embodiments thereof, to anything stated or implied therein or inferred thereupon.
Complex medical electronic devices can be critical to the safety and wellbeing of medical patients, dispersing medicine, controlling medical records, and diagnosis of complex medical issues. Adversarial intrusion or subversion of medical electronic devices' software and hardware can jeopardize diagnostic assurance, patient lives, and patient privacy and security.
The Food and Drug Administration has provided guidance for manufactures to implement solutions to mitigate cybersecurity risk and risk management. Current solutions to cyber-threats in medical devices can include software solutions that analyze incoming threats, to hardware solutions that isolate data storage to provide a physical barrier to medical records. These approaches cannot adequately answer the cyber threat currently facing the medical device community.
To ensure diagnostic integrity, patient privacy, and medical treatment success, the user, physician or nurse or manufacturer of the medical device can have an immediate need for a capability to verify and ensure the trustworthiness of critical medical electronic devices, embedded software, hardware, stored medical records or information, and methods to mitigate vulnerabilities or threats. Furthermore, the physician or nurse has a need to be able to detect cyber intrusion events or cases where electronic assets have been compromised or subverted by at least a cyber-attack or a cyber physical attack.
The accompanying drawings are incorporated in and constitute part of the specification and illustrate various embodiments. In the drawings:
Prior to proceeding to the more detailed description of the present subject matter, it should be noted that, for the sake of clarity and understanding, identical components which have identical functions have been identified with identical reference numerals throughout the several views illustrated in the drawing figures.
The following detailed description is merely exemplary in nature and is not intended to limit the described examples or the application and uses of the described examples. As used herein, the words “example”, “exemplary” or “illustrative” means “serving as an example, instance, or illustration.” Any implementation described herein as “example”, “exemplary” or “illustrative” is not necessarily to be construed as preferred or advantageous over other implementations. All of the implementations described below are exemplary implementations provided to enable persons skilled in the art to make or use the embodiments of the disclosure and are not intended to limit the scope of the disclosure, which is defined by the claims.
The terms and words used in the following description and claims are not limited to the bibliographical meanings, but, are merely used to enable a clear and consistent understanding of the exemplary embodiments. Accordingly, it should be apparent to those skilled in the art that the following description of exemplary embodiments are provided for illustration purpose only and not for the purpose of limiting the invention as defined by the appended claims and their equivalents.
Furthermore, there is no intention to be bound by any expressed or implied theory presented in the preceding technical field, background, or the following detailed description. It is also to be understood that the specific devices and processes illustrated in the attached drawings, and described in the following specification, are simply examples of the inventive concepts defined in the appended claims.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure, and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
As used herein, the terms “adapted” and “configured” mean that the element, component, or other subject matter is designed and/or intended to perform a given function. Thus, the use of the terms “adapted” and “configured” should not be construed to mean that a given element, component, or other subject matter is simply “capable of” performing a given function but that the element, component, and/or other subject matter is specifically selected, created, implemented, utilized, programmed, and/or designed for the purpose of performing the function. It is also within the scope of the present disclosure that elements, components, and/or other recited subject matter that is recited as being adapted to perform a particular function may additionally or alternatively be described as being configured to perform that function, and vice versa. Similarly, subject matter that is recited as being configured to perform a particular function may additionally or alternatively be described as being operative to perform that function.
The term “or” when used in this specification and the appended claims is not meant to be exclusive; rather the term is inclusive, meaning either or both.
It is to be understood that the singular forms “a,” “an,” and “the” include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to “a component surface” includes reference to one or more of such surfaces.
Term “unintended electromagnetic emissions of RF energy” or “unintended emission(s)” when used herein is intended to mean signals that are emitted by electrical and/or electronic devices and/or their components and that are often lie within the noise band. Term “unintended emission(s)” can be considered herein to be not only emissions emitted unintentionally by the device or system contrary to the intent and objective of the device, system, or its designers, but also unintended properties of intended emissions of the device or system. Term “unintended emission(s)” can further refer to electromagnetic energy that is captured and analyzed which is not directly produced by the intended functionality of the device. A non-limiting example of the unintended emissions may be electromagnetic energy that radiates from traces, wires and/or connection nodes when the electrical or electronic device is coupled to a power source and is simply powered ON.
Conversely, term “intended emission(s)” refers to electromagnetic energy that is captured and analyzed by the apparatus which is a direct result of the intended functionality of the device, such as for example the carrier signal of an FM transmitter. Therefore, the intended digital data contained in an intended digital transmission would not be considered unintended, however other aspects of the intended signal such as harmonics, phase noise, frequency stability, out-of-band signal content, amplitude deviation, bit duration times, etc. could be deliberately used by the system for information content to be conveyed to the user.
Term “signature” when used herein is intended to mean a constructed combination-construction of two or more components of a single artifact, two or more components of multiple artifacts or a single component of a single artifact.
The term “artifact” when used herein refers to its definition as “something observed in a scientific investigation or experiment that is not naturally present but occurs as a tangible and/or measurable result of the preparative or investigative procedure”.
In other words, term “artifact” is intended to mean herein an emission characteristic (signature element) that is generated by the device due to application or coupling of RF energy with highly specific frequency(s), wavelength, amplitude, phase, polarization, location, orientation, waveform and/or other characteristics to the device. Artifacts created may include, without limitation, component(s) such as EM wave, frequency feature, for example such as shift, non-linear response, peak location, relative dB height, peak width, harmonic spacing(s) between peaks in a single emission spectral, phase noise present, relationships, for example such as spacing(s) between peeks, in multiple unintentional frequency emissions arising and present, EM polarizations, peak skewness, cross modulation peak characteristics, and magnitude of the noise floor, and power differences between peaks, etc. More specifically, the exemplary embodiments focus on frequency feature unintentionally (not intended by the manufacturer) generated and re-emitted due to illumination with RF energy. As an example, the peak location and relative dB height of new peaks appearing as a result of and far from a fundamental single illumination frequency would be derived and by-product of the design and constructions of the device and hence be considered a frequency artifact(s).
The term “threat” or “adversarial attack” when used herein refers, without limitation, to at least one of cyber intrusion attempt, cyber-attack, cyber-physical attacks, malware, physical malware, tamper, malicious software, anomalous software, modified software, malicious firmware, anomalous firmware, modified firmware, malicious circuitry, anomalous circuitry, modified circuitry, cyber-physical attack, compromised said electronic systems connected to the data line, aged electronics, faulty electronics.
The particular embodiments of the present disclosure can be focused on emissions of unintended electromagnetic energy and, more particularly, the emissions of unintended electromagnetic energy being in a Radio Frequency (RF) spectrum, which is typically referred to in the art as frequencies below 300 GHZ, although infrared, infrasonic and other emissions are also contemplated by the exemplary embodiments.
The particular embodiments of the present disclosure generally provide apparatus and method directed to detecting an anomaly within a medical apparatus at least comprising one or more processing devices, a data transmission connection to a network, triggering an alarm or disabling operation of the medical apparatus when anomaly is detected, and, as a whole, protecting medical apparatus.
The particular embodiments of the present disclosure can be focused on emission(s) of electromagnetic energy and, more particularly, the emission(s) of electromagnetic energy being in a Radio Frequency (RF) spectrum, which is typically referred to in the art as frequencies above 3 kHz and below 300 GHZ, although infrared, infrasonic, and other emissions can be also contemplated by the exemplary embodiments. The forgoing description will be focused on intended and unintended features of intended emission(s) of electromagnetic energy.
Emissions phenomenology, especially unintended emission(s), is causally dependent on its internal circuitry, and manifests as well-defined signatures, in the time domain, frequency domain, or both, that can be classified by identifying characteristic signature parameters and metrics associated with altered or additional functionality. Here functionality is describes as the current working condition of the device, and can be referred to as operational, aged to a degree, likely to imminently fail, or beyond useful life. Term “operational” when used herein means that the device is in full specified working order, with no functional hardware flaws and fully functioning subcomponents. Altered or additional functionality refers to deviations from operational status that damage, degrade, or otherwise change the performance of the electronic device.
The particular embodiments of the present disclosure can be directed to improvement of detection of the anomaly within the electronic apparatus, for example such as a medical apparatus.
The particular embodiments of the present disclosure can be directed to improving an electronic apparatus, for example such as a medical apparatus and, more particularly, such as a transmitter for remote care management.
The particular embodiments of the present disclosure can be also directed to improving operation of the electronic apparatus.
The term “network” refers to a communication path between two or more devices using a previously determined protocol for communication. The network may be based on standards or may be proprietary to a particular embodiment. It may use a variety of physical media, including but not limited to, radio frequency propagation through the air, wire connections, optical communication through the air or through optical fiber, signals coupled to electrical power lines, and magnetically coupled communication.
Every electrical and electronic device or an electronic component necessarily sends Input and Output (I/O) signals and the generation of those signals and the signals themselves create unintended radiated emissions and unintended conducted emissions of a digital and analog nature as well as noise signatures. In addition, to signature creation in the conducted domain the electronics also gives off electromagnetic emissions that can be intended or unintended simply by operating or when being only powered on. The power that powers on the electronics can be external commercial power, battery power, medical power or internal power generation mechanisms. Thus, the signature of the conducted and electromagnetic emissions given off is a property of any electronic device and furthermore can be used indirectly to determine and predict the state of the electronic device.
It has been found, that non-linear attachments, resulting from data bit stream signal mixing with complex interactions, cause weaker or lower frequency emissions of RF energy then emissions from the clocks, the processing devices or any other electronic components within the medical apparatus.
The characteristics of these non-linear attachments, which manifest in the frequency-domain as cross modulation products can be described (examined/analyzed) by an amplitude modulation (AM) or a frequency modulation (FM), or both.
AM can be described by Eq. 1 below.
s(t)=Ac[1+gmod(t)] cos(2πfct) Eq. 1
where:
s(t) is an overall modulated signal,
Ac is an Amplitude of the carrier signal,
g_mod(t) is an Amplitude Modulating (AM) waveform, and
fc is a frequency of the carrier signal.
Eq. 2 describes the case where g_mod(t) is sinusoidal:
where:
Ac is an Amplitude of the carrier signal,
Acm is an Amplitude of the modulating signal, and
fcm is a Frequency of the modulating signal.
If the signal is non-sinusoidal, additional harmonic sidebands can be generated at fc+2fCM, fo+3fCM, etc.
In a reference to
When a signal is modulated via AM or FM, the amplitude and frequency of the signal is changed in response to information; i.e., for frequency modulation the signal frequency is f1 during logic state 1 of a data bit stream, and f0 during logic state 0. The general expression for a modulated signal can be written as:
vM(t)=Ac cos(2π[fc+gmod(t)Δf]t) Eq. 3
where:
Δf is an absolute value of difference between two frequencies (f0 and f1), and
υM(t) is an overall modulated signal.
For a modulating signal gmod(t)=cos(2πfmt), and Eq. 3 can be expanded using Bessel trigonometric identities, shown in Eq. 4. The nth order Bessel Function of the first kind governs mixing characteristics such as frequency separation, amplitude envelope of peaks comprising the emitted signature of cross modulation products.
where:
A is an overall amplitude,
ω is a frequency,
Δf is an absolute value of difference between two frequencies (f0 and f1),
β is the modulation index, and
fb is the bit rate.
The Bessel function can be viewed as a superposition of amplitude modulated tones. The value of β governs the shape of the modulation product envelope and the amplitude of individual cross modulation products, as shown in
Therefore, a strong physical relationship exists between the characteristics of the emission signature and the information state of the computational system. This enables the real-time monitoring of cyber information that is critical to system health and status, as well as the reliable detection of cyber-attacks. Malicious changes to the data bit stream and machine instructions that result in an altered bit rate or a change in pattern will directly manifest in a detectable change in the cross-modulation envelope patterns. β, when reconstructed from the emissions envelope, can determine pulse train characteristics and hence the current cyber information state of the device.
In addition to cross modulation relationships, other linear and non-linear mixing products can change when programming changes are made. Programming changes can load circuits differently resulting in subtle frequency shifts at clock frequencies. Another exploitable feature to be examined/analyzed is a phase noise. The “phase noise” is to be understood herein as a frequency domain representation of rapid, short-term, random fluctuations in the phase of a waveform, caused by time domain instabilities (“jitter”). Phase noise attaches to frequency peaks throughout the device emission spectrum. Determination of a spectrum of the phase noise generated by small sinusoidal currents can be approximated by Eq. 5:
where:
Im is amplitude of the modulation current,
Cm is amplitude of the modulation capacitance,
qmax is the maximum charge on the capacitor in the modulated circuit,
Δω is the frequency separation of the harmonics, and
ω0 is a fundamental frequency.
Extrapolating to power, Eq. 6 gives us the expected power for small sinusoidal currents, with Eq. 7 extending this approximation to general white noise sources.
where:
PSBC (ΔΩ) is a noise power.
Additional emission features which can provide exploitable information include: harmonic frequency shifting, total emitted energy, energy distribution and peak structure.
The subject matter will be illustrated further in a combination with a medical apparatus, for example such as a Merlin@Home™ transmitter 10 of
In an exemplary embodiment, the device configured to detect, in a real-time manner, a presence or an absence of a cyber attack onto the transmitter 10 can be a stationary device 100 of
The device 100 can be configured as comprising a chassis 102, printed circuit board assemblies 104, 106, and 108 mounted on or inside the chassis 102, a power supply 110 mounted on or inside the chassis, an input/output assembly 112, a transceiver 120 coupled to the input/output assembly 112, and an optional forced air conduction cooling fan 124. The input/output assembly 112 comprises a member 120 that can be configured to be attached to and close one end of the chassis 102 and connectors 114, 116 and 118 extending from an exterior surface of the member 120. The connectors 114, 116 and 118 can be adapted with pins or sockets. The optional forced air conduction cooling fan 124, when provided, can close the opposite end of the chassis 102. If the optional forced air conduction cooling fan 124 is not provided, the opposite end of the chassis 102 can be closed with another member, for example being similar to the member 120 but without the connectors, or can be left open. Although the device 100 has been illustrated in
Now in a particular reference to
The sensor 820 may be also referred in this document to as a receiver, an emissions acquisition assembly or an emissions pattern sensor.
The sensor 820 is configured to capture unintended emitted electromagnetic energy and/or unintended conducted energy from the transmitter 10. When the sensor 820 is configured to capture unintended emitted electromagnetic energy 3002 from the transmitter 10, the sensor 820 includes a low noise amplifier (LNA) 834, a tuner 836 and analog to digital converter (ADC) 838. The tuner 836 may be of RF tuner type. The sensor 820 can be a general receiver or tuner and the general receiver can be a heterodyne or super-heterodyne receiver or equivalent. The receiver 820 can be improved by providing a broadband response. Though one embodiment focuses on emissions from about 100 KHz to about 6 GHZ the bandwidth can be reduced to about 30 MHz to about 1 GHz to capture the majority of emissions from the devices coming in to the facility. The sensor 820 may be provided as a stand-alone device or a circuit board assembly. The sensor 820 can be also configured to capture intended emitted electromagnetic energy.
Further sensitivity is achieved by lowering the noise figure of the system. In one embodiment, the sensor 820 has a modified front end with the Low Noise Amplifier (LNA) 834 with an ultra-low noise figure.
Each of the time domain and frequency domain processing modules, 450A and 450B respectively, includes one or more processors or logic devices, for example such as general purpose processor(s) 402 and programmable logic device 406 that may be a FPGA. Some FPGAs have logic employing multiple states that each have their own decision trees which the FPGA typically periodically cycles between. One exemplary embodiment is configured to examine each of the states in more detail and with less effective unrelated noise from adjacent states by employing a means to synchronize acquisitions in the time domain with the different states or sensed states.
To examine software based malware more effectively, an acquisition or analysis time window of emission signal input can be selected from a emission signal input stream, typically from the digitized analog time domain data before the Fast Fourier Transform (FFT) or even before the down conversion before the FFT, and which is pre-known or has been found to be associated with the execution of that software or a segment of that software. In this way, the specific malware to be found can be considered to be separated from the ongoing noise in the time domain, as compared with examination in more detail in the frequency domain.
DSP integrated circuit(s) (IC) 404 and a single board computer 451 may be also provided. There is also a computational medium comprising algorithms and/or executable instructions that, when executed by the one or more processors or logic devices, cause the one or more processors or logic devices to perform, in one exemplary embodiment, the following steps on the captured unintended emitted electromagnetic energy and/or the unintended conducted energy: measuring a feature value in at least one spectral frequency region of the captured unintended emitted electromagnetic energy and/or unintended conducted energy from the one or more electrical devices, calculating a difference value between the measured feature value and a baseline feature value, and determining, based on the calculated difference value, a presence or an absence of at least one of malicious software, anomalous software, modified software, malicious firmware, anomalous firmware, modified firmware, malicious circuitry, anomalous circuitry and modified circuitry within the one or more electrical devices.
A logic set of algorithms for comparing and matching the captured RF energy to a set of parameters identified for a baseline configuration of the operational transmitter 10 is best shown in
Logic set 810 executes Fourier Transform 846 to convert the data in the digital filter 840 into the wavelet de-noise 847 for further processing in the logic set 827. At least one and plurality of algorithms 848, 850, 852, 853 and 857 in the logic subset 828 are executed to match the data collected to the expected signature for the transmitter 10. More than one algorithm may be used to match mutually exclusive parameters of the RF energy emission signature and then combine those using numerically weighted coefficients for each in a linear or nonlinear equation to yield a final overall score approximating the degree of match to an infected device. A machine learning approach, neural network or other approach may be used to assist or replace this. In this manner the ability to match the collected signature to the expected signature is improved. The weighting of these algorithms favorably improves the ability to detect modified or unmodified parts. One key factor in determining the quality of signal fed into the overall system it the linearity, number of bits (Effective Number of Bits (ENOB)) and speed of the ADC 838 converting the raw analog time domain voltages into digital values for processing. A higher ENOB for example generates less noisy data resulting in more accurate and/or faster modified/unmodified determination decisions.
Thus, logic set 810 can include at least one of Harmonic Analysis, Matched Filter, non-harmonic correlation, timing correlation, Artificial Neural Networks (ANN), specifically multilayer perception (MLP) feed-forward ANN with back propagation (BP), Wavelet Decomposition, Autocorrelation, Spectral Feature Measurements or Statistics, Clustering or Phase Detrending algorithms.
The configuration and/or operation of the apparatus 450 may be also in accordance with disclosures in the U.S. Pat. Nos. 7,515,094 and 8,063,813, both issued to Keller, III; in the U.S. Pat. No. 8,643,539 issued to Pauly on Feb. 4, 2014; and in U.S. Pat. No. 8,825,823 issued on Sep. 2, 2014 and entitled “System and Method for Physically Detecting, Identifying, Diagnosing And Geo-locating Devices Connectable To A Network”, all owned by the assignee of the instant invention and whose teachings are incorporated herein by reference thereto.
The apparatus 450 may further comprise an antenna 1022 coupled to the sensor 820 and collecting the unintended emitted electromagnetic energy from the transmitter 10.
The apparatus 450 may further comprise a graphic user interface (GUI) display 476 in a communication with one or both time domain and frequency domain processing modules, 450A and 450B respectively, for example through the single board computer 451.
Filter setting 837 may be also provided with a connection 839 to the programmable logic device 406.
In an embodiment, the device configured to detect, in a real-time manner, a presence or an absence of a cyber attack onto the transmitter 10 can be a hand-held or a portable transmitter 10 of
The transmitter 10 shown in
The arrows between successive blocks in the diagram represent the signal path taken by the captured emissions from the antenna 586, through the LNA 508, splitter 510, tuner 512, ADC 514 into the FPGA/CPU 516. Here the splitter 510 is an RF splitter that equally routes the incoming signal into four channels of the device, typically to process different frequency regions by each channel. This is illustrated by the four arrows between the splitter 510 and the tuner 512. Each channel can represent a separate data throughput path. The FPGA/CPU 516 are chips typically used for down converting and FFT generation and also controls what is displayed on the graphical display 530 and controls the keypad 532, previously described. The FPGA requires a clock signal to maintain normal operation. This clock signal is provided as an on-board or co-located hardware block 570. Output from the FPGA can be provided through the USB PHY block 550 to an external connector 552 and externally connected USB device such as Flash memory, Ethernet hub, computer, database, or internet cloud storage. A non-volatile memory block 538 is also provided within the device as a means to store historical records of degradation values, and interfacing with a user. The random access memory block 518 may be an internal part of the computer, a removable external element coupled to the computer, or unit that is remotely accessible via a wired or wireless network. Power for the board is typically supplied in this embodiment via a chargeable or non-chargeable battery 560. Further embodiments contemplate power being supplied via a DC power supply.
The device 100 may connect, for example by using a MIL-STD-1553B bus specification, to a remote terminal, wherein the bus connection is drawn from a stub through a transformer. While this connection can be sufficient to support analysis of digital information and monitoring of faults across normal communication lines, the device 100 may additionally leverage unintended emissions information from LRUs that has attached to the data bus 1050 or data line(s) 1004 within the transmitter 10. To access this information, the device 100 may further comprise an analog data bus coupler or coupling device 1002, best shown in
In a further reference to
Analog Coupler Electronics 1006 are typically shielded and housed in a mechanically suitable enclosure 1005, the whole comprising the Analog Coupler 1002.
In an aspect, a ground can be used instead of one of the differential input. Use of ground can reduce implementation cost.
Connections to the device 100 from the signal connection lines 1008, 1010, 1012, 1013, and/or 1015 may typically go through a shielded cable into one of the connectors on the input/output assembly 112, for example such the connector 118.
These signals are then appropriately processed through means such as LNA 834, Tuner 836, and/or ADC 838 for conversion and or analysis by device 100, such as conversion to the frequency domain using an FFT. Direct digital signal acquisition without a tuner is also envisioned herein, and digital downconversion may be performed inside a FPGA 406.
The data bus coupler 1002 can deliver additional information critical to robust cyber-physical security and electronic health monitoring applications as contemplated. The data bus coupler 1002 may include dedicated hardware 1008, 1010, 1012, 1013 and 1015 capable of acquiring differential and common mode RF unintended emissions that are present on the data bus 1050.
The data bus coupler 1002 can utilize a conductor current probe such as or similar to 1010 to capture radiated unintended emissions from each of the bus lines 1004 as well as the outer shield 1003. The probe is configured to focus on frequency ranges of greatest significance to CPS applications, which typically have been demonstrated to be the 1 MHz-3 GHz range. The data bus coupler 1002 may also include dedicated cabling to tie into the twisted pair 1004 in the data bus 1050 cabling to capture analog and digital information using standard data bus 1050 techniques that can be analyzed to support the Intrusion Detection system.
In an embodiment, a method is provided for detecting, in a real-time manner, a presence or an absence of a cyber attack onto a medical apparatus at least comprising one or more processing devices, a data transmission connection to a network, and non-linear attachments of the one or more processing devices to clock signals. The method comprises the steps of capturing, with an antenna, one or more emissions of electromagnetic energy from the processing devices. Then, converting, with a receiver coupled to the antenna, the one or more emissions captured by the antenna from an analog to a digital form. Next, generating, with a controller, a digital signal in a time domain. Converting, with the controller, the digital signal from the time domain to a frequency domain, the digital signal containing a signature of cross modulation products from the non-linear attachments. Then, processing, with the controller in the frequency domain, the signature of cross modulation products to determine mixing characteristics of the cross modulation products and/or harmonic features to determine mixing characteristics of the cross modulation products. Next, detecting, with the controller, based on the mixing characteristics, the absence or the presence of the cyber attack. And, triggering, with the controller, an event when detecting the presence or an absence of the cyber attack.
In an embodiment, a method is provided for detecting, in a real-time manner, a presence or an absence of an anomaly in a medical apparatus. The anomaly can comprise at least one of a cyber intrusion attempt, a cyber-attack, a cyber-physical attack, a malware, a physical malware, a tamper, a malicious software, an anomalous software, a modified software, a malicious firmware, an anomalous firmware, a modified firmware, a malicious circuitry, an anomalous circuitry, and a modified circuitry. Although it is contemplated herewithin that the method can be provided for detecting, in a real-time manner, a presence or an absence of an anomaly in any electronic device.
The medical apparatus can at least comprise one or more processing devices and a data transmission connection to a network. The method comprises the steps of capturing, with an antenna, an emission of electromagnetic energy, in a radio frequency (RF) range, from the processing devices. Then, converting, with a receiver coupled to the antenna, the emission captured by the antenna from an analog to a digital form. Next, generating, with a controller, a digital signal of the emission in a time domain. Converting, with the controller, the digital signal from a time domain into a frequency domain with the digital signal containing an emission signature at two or more frequencies. Next, measuring, with the controller in the time domain, an emission characteristic of the emission signature at the two or more frequencies. Measuring of the emission characteristic can comprise applying, with the controller, Bessel Functions of a first kind due to a frequency modulation. Then, comparing therebetween, with the controller, measurements of the emission characteristic in each of the two or more frequencies. Detecting, with the controller, based on a comparison of the emission characteristic in the each of the two or more frequencies, the absence or the presence of the anomaly. Finally, triggering, with the controller, an event when detecting the presence or an absence of the anomaly.
In an embodiment, therein is provided a method of detecting, in a real-time manner, a presence or an absence of an anomaly in a medical apparatus. The medical apparatus at least comprises one or more processing devices, a data transmission connection to a network. The method comprises the steps of capturing, with an antenna, an emission of electromagnetic energy, in a radio frequency (RF) range, from the processing devices. Then converting, with an analog to digital converter within a receiver coupled to the antenna, the emission captured by the antenna from an analog to a digital form. Next, generating, with a controller, a digital waveform in a time domain, where the digital waveform contains an emission signature. Converting, with the controller, the emission signature from a time domain into a frequency domain. Then, detecting, with the controller in the time domain, a time varying content, in which sideband frequencies arise and disappear due to cyclic function of the analog to digital converter, and/or frequency shifts occur. Detecting, with the controller, based on a detection of the time varying content, the absence or the presence of the anomaly. And, triggering, with the controller, an event when detecting the presence or an absence of the anomaly.
In either of the embodiments, the emission characteristic comprises one of a harmonic frequency shifting, a total emitted energy, an energy distribution, a peak height, and a peak shift.
In either of the embodiments, the data transmission comprises at least one of Ethernet, IEEE 802.11 standard WiFi, Bluetooth communication standard, a Worldwide Interoperability for Microwave Access (WiMax) standard, and a ZigBee communication standard.
In either of the embodiments, triggering, of the event can comprise activating an alarm when detecting the presence of the anomaly or the cyber attack. The alarm can be an audio annunciation, for example of a message, or a visual annunciation on medical apparatuses equipped with a light or a lighted button, where such light will operate differently from a selected or a normal operation. Triggering of an event can comprise displaying a message on a display of the medical apparatus equipped with such display. Triggering of an event can comprise providing disabling an operation of the medical apparatus by providing an input signal to the one or more processing devices therewithin. Triggering of an event can comprise disabling, with the controller, communication of the medical apparatus with the network by triggering an input signal to the one or more processing devices within the medical apparatus. Triggering of an event can comprise generating and transmitting a communication to a server on the network so that an operator of such network can decide on an action regarding the operation of the medical apparatus.
Unintended radiated and conducted electromagnetic emissions contain a wealth of cyber information that is causally dependent upon system status. Any change to system status, such as a hardware Trojan, or introduction of ransomware and other malicious software attack, necessarily alters the emitted waveform in some quantifiable way, and therefore can be automatically detected and analyzed by the highly sensitive Hiawatha sensor. Cyber information can be captured through emissions analysis, and used for active and real-time monitoring of the cyber-security status of the medical device under test.
In addition to providing substantial information regarding cyber information states, unintended emissions also enable reliable real-time detection of cyber-attacks. Examples of unintended RF emissions expected from detectable cyber-attacks include the following:
Each of these types of attacks is expected to have its own unique emissions signature characteristics, or will change the stable-state emissions characteristics of the device
In either of the embodiments, the antenna, receiver and controller can be provided in various forms.
In one aspect, they can be integrated in a single device, for example such as a probe. The probe can be disposed within the medical apparatus, can be positioned remotely (at a distance) from it or attached to the exterior surface thereof. The controller within the probe can be directly coupled to the power supply within the medical apparatus or the power connection therewithin or can be provided with its own power supply or power connection thereto. I one aspect, the probe can be provided as a handheld device that would be either held by a user or positioned at adjacent to the medical apparatus during operation of the handheld device.
In one aspect, the antenna, receiver and controller can be integrated into an embedded electronic device that can comprise a chassis, one or more printed circuit board assemblies mounted on and/or in the chassis, a power supply, an input/output assembly, and/or a forced air conduction cooling fan, and a common mode probe. The device is embedded into a medical device such that the common mode probe has access to the communications bus of the medical device.
In one aspect, an enclosed chassis is mounted on and/or adjacent to a networked medical device or networked medical computer terminal such that the electromagnetic emissions are received by a conformal antenna connected to the apparatus.
In one aspect, an enclosed chassis is mounted on and/or in a network server cabinet connected to a common mode probe tied to the communications bus, which could be ethernet or a lan line. The common mode probe will measure emissions from the communication bus and identify anomalous communications traffic. If anomalous communications traffic is identified an event will be triggered notifying personnel of the presence of the anomaly.
In one aspect, the antenna, receiver and controller can be disposed or mounted independently within the medical apparatus and operatively coupled therebetween as well as being operatively coupled to the component(s) of the medical apparatus.
In either of the aspects, the antenna can be any one of a conformal antenna, a common mode probe, a differential mode probe, a semi-fractal antenna, a loop antenna, a dipole antenna and/or a monopole antenna.
In either of the aspects, the receiver can comprise a low noise amplifier, an RF signal splitter, one or more tuners, one or more Analog to Digital converters, and a controller. A reference clock supply is optional.
In either of the aspects, the controller comprises one or more one or more processors or logic devices, and a non-transitory (tangible) computational (computer readable recording) medium comprising executable instructions that, when executed by said one or more processors or logic devices, cause said one or more processors or logic devices to perform the above described method steps. The non-transitory (tangible) computational (computer readable recording) medium resides in a memory. In an embodiment, the more one or more processors and memory may be integrated on a single integrated circuit.
Tangible computer readable medium means any physical object or computer element that can store and/or execute computer instructions. Examples of tangible computer readable medium include, but not limited to, a compact disc (CD), digital versatile disc (DVD), blu-ray disc (BD), usb floppy drive, floppy disk, random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM), optical fiber, etc. It should be noted that the tangible computer readable medium may even be paper or other suitable medium in which the instructions can be electronically captured, such as optical scanning. Where optical scanning occurs, the instructions may be compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in computer memory.
The non-transitory computer-readable recording medium may include program instructions, data files, and data structures, alone or in a combination thereof.
Alternatively, it may be a plugin or part of a software code that can be included in, or downloaded and installed into a computer application. As a plugin, it may be embeddable in any kind of computer document, such as a webpage, word document, pdf file, mp3 file, etc.
Thus, any of the above disclosed methods may be implemented in the form of software stored on a computer-readable non-transitory information storage medium such as an optical or magnetic disk, a non-volatile memory (e.g., Flash or ROM), RAM, and other forms of volatile memory. The information storage medium may be an internal part of the computer, for example such as a general use computer, a removable external element coupled to the computer, or unit that is remotely accessible via a wired or wireless network. The antenna and receiver can be then coupled to the computer. In one aspect, the computer may comprise a communication module comprising the receiving means. In one aspect, the controller can comprise an information storage medium that may be an internal part of the computer, a removable external element coupled to the computer, or unit that is remotely accessible via a wired or wireless network.
The disclosed subject matter can be implemented by single or multiple algorithms.
Persons of ordinary skill in the art may appreciate that, in combination with the examples described in the embodiments herein, units and algorithm steps can be implemented by electronic hardware, computer software, or a combination thereof. In order to clearly describe the interchangeability between the hardware and the software, compositions and steps of every embodiment have been generally described according to functions in the foregoing description. Whether these functions are performed using hardware or software depends on particular applications and design constraints of the technical solutions. A person skilled in the art may use different methods to implement the described functions for each specific application. However, such implementation should not be considered as beyond the scope of the present invention.
In one aspect, detection of intrusion, cyber-attacks, and cyber-physical attacks can be realized by using multiple modes of measuring the signatures in multiple domains and combining that data with fault monitoring and bitstream monitoring of intended signals.
It would be understood that the microprocessor based controller functions as a computing device.
As will be appreciated by those of ordinary skill in the art, aspects of the various embodiments may be embodied as a system, method or computer program product.
Therefore, the subject matter may take the form of a computer program product containing one or more sequences of machine-readable instructions describing a method as disclosed above, or a data storage medium (e.g., semiconductor memory, magnetic or optical disk) having such a computer program stored therein.
Obviously, those skilled in the art shall understand that the above-mentioned components and steps of the disclosure can be realized by using a general purpose computing device, can be integrated in one computing device or distributed on a network which consists of a plurality of computing devices. For example, conversion of the data from the time domain into frequency domain can be done remotely and by a separate computing device from measuring the emission characteristics (artifacts). Alternatively, the components and the steps of the disclosure can be realized by using the executable program code of the computing device. Consequently, they can be stored in the storing device and executed by the computing device, or they are made into integrated circuit component respectively, or a plurality of components or steps thereof are made into one integrated circuit component. Thus, the disclosure is not limited to any particular combination of hardware and software.
Many of the elements described in the disclosed embodiments may be implemented as modules. A module is defined here as an isolatable element that performs a defined function and has a defined interface to other elements. The modules described in this disclosure may be implemented in hardware, software in combination with hardware, firmware, wetware (i.e hardware with a biological element) or a combination thereof, all of which are behaviorally equivalent. For example, modules may be implemented as a software routine written in a computer language configured to be executed by a hardware machine (such as C, C++, Smalltalk, Fortran, Java, Basic, Matlab or the like) or a modeling/simulation program such as Simulink, Stateflow, GNU Octave, or Lab VIEWMathScript. Additionally, it may be possible to implement modules using physical hardware that incorporates discrete or programmable analog, digital and/or quantum hardware. Examples of programmable hardware comprise: computers, microcontrollers, microprocessors, application-specific integrated circuits (ASICs); field programmable gate arrays (FPGAs); and complex programmable logic devices (CPLDs). Computers, microcontrollers and microprocessors can be programmed using languages such as assembly, C, C++ or the like. FPGAs, ASICs and CPLDs can be often programmed using hardware description languages (HDL) such as VHSIC hardware description language (VHDL) or Verilog that configure connections between internal hardware modules with lesser functionality on a programmable device. Finally, it needs to be emphasized that the above mentioned technologies can be often used in combination to achieve the result of a functional module.
In an embodiment, a method is provided to detect, in a real-time manner, a presence or an absence of a cyber attack onto a medical apparatus at least comprising one or more processing devices, a data transmission connection to a network, and non-linear attachments of the one or more processing devices to clock signals. The method comprises the steps of capturing, with an antenna, one or more emissions of electromagnetic energy from the processing devices; converting, with a receiver coupled to the antenna, the one or more emissions captured by the antenna from an analog to a digital form; generating, with a controller, a digital signal in a time domain; converting, with the controller, the digital signal from the time domain to a frequency domain, the digital signal containing a signature of cross modulation products from the non-linear attachments; processing, with the controller in the frequency domain, the signature of cross modulation products to determine mixing characteristics of the cross modulation products and/or harmonic features; detecting, with the controller, based on the mixing characteristics, the absence or the presence of the cyber attack; and triggering an event when detecting the presence of the cyber attack.
A feature of this embodiment, is that the step of processing the signature of cross modulation products comprises a step of generating, with the controller, harmonic sideband frequencies if the digital signal is a non-sinusoidal signal.
A feature of this embodiment, is that step analyzing harmonic side bands comprises a step of utilizing, with the controller, one of an amplitude modulation, a frequency modulation and a combination thereof.
A feature of this embodiment, is that step of processing the signature of cross modulation products comprises a step of analyzing, with the controller, a modulated frequency domain signal.
A feature of this embodiment, is that the step of analyzing a modulated frequency domain signal comprises a step of determining, with the controller, one or more values of the modulation index β.
A feature of this embodiment, is that the step of detecting the absence or the presence of the cyber attack comprises a step of scoring, with the controller, the one or more values of the modulation index β.
A feature of this embodiment, is that the step of processing the signature of cross modulation products comprises a step of determining, with the controller, a phase noise, where the phase noise is generated by small sinusoidal currents.
A feature of this embodiment, is that the step of triggering an event comprises a step of triggering an alarm.
A feature of this embodiment, is that step of triggering an event comprises a step of transmitting a communication to a remote device.
A feature of this embodiment, is that step of triggering an event comprises a step of generating, with the controller, a trigger signal and a step of disabling operation of the medical apparatus in a response to a receipt of the trigger signal.
A feature of this embodiment, is that the step of converting the one or more emissions, comprises a step of executing a Fast Fourier Transform on the digitized signal.
A feature of this embodiment, is that antenna, the receiver and controller are integrated into a single device.
A feature of this embodiment, is that the single device is positioned remotely from the medical apparatus.
A feature of this embodiment, is that the single device is integrated with the medical apparatus.
A feature of this embodiment, is that the antenna and sensor are integrated with the medical apparatus and the controller is disposed remotely therefrom.
A feature of this embodiment, is that the controller comprises a communication connection with a remote network computer or server.
A feature of this embodiment, is that the alarm can be received at a mobile communication device for alarming a medical professional tasked with monitoring health condition of a patient connected to the medical apparatus.
A feature of this embodiment, is that the method can be used to monitor also verify proper monitoring of a health condition in a patient by detecting any anomaly in operational status of the medical apparatus.
In an embodiment, a method is provided to detect, in a real-time manner, a presence or an absence of an anomaly in a medical apparatus at least comprising one or more processing devices, a data transmission connection to a network. The method comprises the steps of capturing, with an antenna, an emission of electromagnetic energy, in a radio frequency (RF) range, from the processing devices; converting, with a receiver coupled to the antenna, the emission captured by the antenna from an analog to a digital form; generating, with a controller, a digital signal in a time domain; converting, with the controller, the digital signal from the time domain into a frequency domain, the digital signal containing an emission signature at two or more frequencies; measuring, with the controller in the frequency domain, an emission characteristic of the emission signature at the two or more frequencies; comparing, with the controller, measurements of the emission characteristic in each of the two or more frequencies; detecting, with the controller, based on a comparison of the emission characteristic in the each of the two or more frequencies, the absence or the presence of the anomaly; and triggering, with the controller, an alarm when detecting the presence of the anomaly.
A feature of this embodiment, is that the step of measuring of the emission characteristic comprises a step of applying, with the controller, Bessel Functions of a first kind due to a frequency modulation.
A feature of this embodiment, is that the emission characteristic can comprise any one of a harmonic frequency shifting, a total emitted energy, an energy distribution, a peak height, and a peak shift.
A feature of this embodiment, is that the data transmission can comprise at least one of Ethernet, IEEE 802.11 standard WiFi, Bluetooth communication standard, a Worldwide Interoperability for Microwave Access (WiMax) standard, and a ZigBee communication standard.
A feature of this embodiment, is that the anomaly can comprise at least one of a cyber intrusion attempt, a cyber attack, a cyber-physical attack, a malware, a physical malware, a tamper, a malicious software, an anomalous software, a modified software, a malicious firmware, an anomalous firmware, a modified firmware, a malicious circuitry, an anomalous circuitry, and a modified circuitry.
In an embodiment, a method is provided to detect, in a real-time manner, a presence or an absence of an anomaly in a medical apparatus at least comprising one or more processing devices, a data transmission connection to a network. The method comprises the steps of capturing, with an antenna, an emission of electromagnetic energy, in a radio frequency (RF) range, from the processing devices; converting, with an analog to digital converter within a receiver coupled to the antenna, the emission captured by the antenna from an analog form to a digital form; generating, with a controller, a digital waveform in a time domain, the digital waveform containing an emission signature; converting, with the controller, the emission signature from a time domain to a frequency domain; detecting, with the controller in the time domain, a time varying content, in which sideband frequencies arise and disappear due to cyclic function of the analog to digital converter, and/or frequency shifts occur; detecting, with the controller, based on a detection of the time varying content, the absence or the presence of the anomaly; and triggering, with the controller, an alarm when detecting the presence of the anomaly.
In this method, the controller comprises one or more processors or logic devices, and a non-transitory computational medium comprising executable instructions that, when executed by the one or more processors or logic devices, cause the one or more processors or logic devices to perform the method steps.
In an embodiment, a device is configured to detect, in a real-time manner, a presence or an absence of an anomaly in an electronic apparatus at least comprising one or more processing devices, a data transmission connection to a network. The device comprises a sensor coupled to a data bus, the sensor configured to capture information content communicated through the data bus representing a form of electromagnetic emissions being at least one of differential mode electromagnetic emissions, common mode electromagnetic emissions, coupled radiated electromagnetic emissions, and data bit streams and convert information content from an analog signal to a digital signal form; one or more processors or logic devices; and a non-transitory computational medium comprising executable instructions that, when executed by the one or more processors or logic devices, cause the one or more processors or logic devices to perform the following steps on the captured information content: generate a digital signal in a time domain, convert the digital signal from the time domain to a frequency domain, the digital signal containing a signature of cross modulation products from the non-linear attachments, process, in the frequency domain, the signature of cross modulation products to determine mixing characteristics of the cross modulation products and/or harmonic features, detect, based on the mixing characteristics, the absence or the presence of the cyber attack, and trigger an event when detecting the presence of the cyber attack.
In an embodiment, a device is configured to detect, in a real-time manner, a presence or an absence of an anomaly in an electronic apparatus at least comprising one or more processing devices, a data transmission connection to a network. The device comprises a sensor coupled to a data bus, the sensor configured to capture information content communicated through the data bus representing a form of electromagnetic emissions being at least one of differential mode electromagnetic emissions, common mode electromagnetic emissions, coupled radiated electromagnetic emissions, and data bit streams and convert information content from an analog signal to a digital signal form; one or more processors or logic devices; and a non-transitory computational medium comprising executable instructions that, when executed by the one or more processors or logic devices, cause the one or more processors or logic devices to perform the following steps on the digital signal: generate a digital signal in a time domain, convert the digital signal from the time domain into a frequency domain, the digital signal containing an emission signature at two or more frequencies, measuring, in the frequency domain, an emission characteristic of the emission signature at the two or more frequencies, compare measurements of the emission characteristic in each of the two or more frequencies, detect based on a comparison of the emission characteristic in the each of the two or more frequencies, the absence or the presence of the anomaly, and trigger an event when detecting the presence of the anomaly.
In an embodiment, a coupling device is configured to detect, in a real-time manner, a presence or an absence of an anomaly in an electronic apparatus at least comprising one or more electronic components, one or more processing devices, and a data transmission connection to a network. The coupling device comprises a sensor; and a controller coupled to the sensor, the device being further configured to receive and process electromagnetic emissions conducted through the data bus, the conducted emissions being at least one of differential mode electromagnetic emissions, common mode electromagnetic emissions, coupled radiated electromagnetic emissions, free field electromagnetic emissions and data bit streams. The coupling device is coupled to a data bus within the apparatus and acquires conducted emissions and processes the emissions to determine a presence or an absence of a threat a presence or an absence of a threat to the electronic apparatus.
In an embodiment, therein is provided a non-transitory computer readable recording medium, having recorded thereon a program for executing the method of any of the above method embodiments.
In an embodiment, therein is provided a tangible computer system programmed to implement a method of detecting, in a real-time manner, a presence or an absence of a cyber attack onto a medical apparatus at least comprising one or more processing devices, a data transmission connection to a network, and non-linear attachments of the one or more processing devices to clock signals, the method comprising: steps of any of the above method embodiments.
In an embodiment, a computer system is configured to detect, in a real-time manner, a presence or an absence of a cyber attack onto a medical apparatus at least comprising one or more processing devices, a data transmission connection to a network, and non-linear attachments of the one or more processing devices to clock signals comprising (i) an electronic, computer-accessible storage device, and (ii) a computer processor structured and programmed to automatically capture, with an antenna, an emission of electromagnetic energy, in a radio frequency (RF) range, from the processing devices; convert, with a receiver coupled to the antenna, the emission captured by the antenna from an analog signal form to a digital signal form; generate, with a controller, a digital signal in a time domain; convert, with the controller, the digital signal from the time domain into a frequency domain, the digital signal containing an emission signature at two or more frequencies; measure, with the controller in the time domain, an emission characteristic of the emission signature at the two or more frequencies; compare, with the controller, measurements of the emission characteristic in each of the two or more frequencies; detect, with the controller, based on a comparison of the emission characteristic in the each of the two or more frequencies, the absence or the presence of the anomaly; and trigger, with the controller, an alarm when detecting the presence of the anomaly.
In an embodiment, an article comprising a non-transitory tangible medium encoding computer-readable instructions implementing a method of using a computer system to detect, in a real-time manner, a presence or an absence of a cyber attack onto a medical apparatus at least comprising one or more processing devices, a data transmission connection to a network, and non-linear attachments of the one or more processing devices to clock signals by automatically capture, with an antenna, an emission of electromagnetic energy, in a radio frequency (RF) range, from the processing devices; convert, with a receiver coupled to the antenna, the emission captured by the antenna from an analog signal form to a digital signal form; generate, with a controller, a digital signal in a time domain; convert, with the controller, the digital signal from the time domain into a frequency domain, the digital signal containing an emission signature at two or more frequencies; measure, with the controller in the time domain, an emission characteristic of the emission signature at the two or more frequencies; compare, with the controller, measurements of the emission characteristic in each of the two or more frequencies; detect, with the controller, based on a comparison of the emission characteristic in the each of the two or more frequencies, the absence or the presence of the anomaly; and trigger, with the controller, an alarm when detecting the presence of the anomaly.
In an embodiment, an article comprises a tangible medium that is not a transitory propagating signal encoding computer-readable instructions that, when applied to a computer system comprising one or more computers, instruct the computer system to perform a method for detecting, in a real-time manner, a presence or an absence of a cyber attack onto a medical apparatus at least comprising one or more processing devices, a data transmission connection to a network, and non-linear attachments of the one or more processing devices to clock signals, comprising capturing, with an antenna, one or more emissions of electromagnetic energy from the processing devices; converting, with a receiver coupled to the antenna, the one or more emissions captured by the antenna from an analog to a digital form; generating, with a controller, a digital signal in a time domain; converting, with the controller, the digital signal from the time domain to a frequency domain, the digital signal containing a signature of cross modulation products from the non-linear attachments; processing, with the controller in the frequency domain, the signature of cross modulation products to determine mixing characteristics of the cross modulation products and/or harmonic features to determine mixing characteristics of the cross modulation products; detecting, with the controller, based on the mixing characteristics, the absence or the presence of the cyber attack; and triggering an event when detecting the presence of the cyber attack.
In an embodiment, a medical apparatus comprises one or more electronic components and/or processing devices; one or more clocks; non-linear attachments of the one or more electronic components and/or processing devices and the one or more clocks; an antenna configured to capture emission of electromagnetic energy, in a radio frequency (RF) range, from the one or more electronic components and/or processing devices;
a receiver coupled to the antenna, the receiver being configured to convert the emission captured by the antenna from an analog signal form to a digital signal form; and a controller comprising one or more processors or logic devices; and a non-transitory computational medium comprising executable instructions that, when executed by the one or more processors or logic devices, cause the one or more processors or logic devices to perform the following steps on the digital signal generate a digital signal in a time domain, convert the digital signal from the time domain into a frequency domain, the digital signal containing an emission signature at two or more frequencies, measure, in the time domain, an emission characteristic of the emission signature at the two or more frequencies, compare measurements of the emission characteristic in each of the two or more frequencies, detect based on a comparison of the emission characteristic in the each of the two or more frequencies, the absence or the presence of the anomaly, and trigger an event when detecting the presence of the anomaly.
In some embodiments, the device is configured to scan operation of the electronic apparatus either continuously, at pre-selected intervals, or as determined by the user or a monitoring professional.
The chosen exemplary embodiments of the claimed subject matter have been described and illustrated, to plan and/or cross section illustrations that are schematic illustrations of idealized embodiments, for practical purposes so as to enable any person skilled in the art to which it pertains to make and use the same. It will be understood that variations, modifications, equivalents and substitutions for components of the specifically described exemplary embodiments of the invention may be made by those skilled in the art without departing from the spirit and scope of the invention as set forth in the appended claims.
It should be appreciated that reference throughout this specification to “one embodiment” or “an embodiment” means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the disclosed subject matter. Therefore, it is emphasized and should be appreciated that two or more references to “an embodiment” or “one embodiment” or “in an example” or “in one example” in various portions of this specification are not necessarily all referring to the same embodiment or the same variation. Furthermore, the particular features, structures or characteristics may be combined as suitable in one or more embodiments of the disclosed subject matter.
Similarly, it should be appreciated that in the description of embodiments, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the various inventive aspects. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed subject matter requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description.
It should be noted that all possible combinations of features which would be implied by rendering the claims multiply dependent are explicitly envisaged and should be considered part of the invention.
Any element in a claim that does not explicitly state “means for” performing a specified function, or “step for” performing a specified function, is not to be interpreted as a “means” or “step” clause as specified in 35 U.S.C. § 112, ¶ 6. In particular, any use of “step of” in the claims is not intended to invoke the provision of 35 U.S.C. § 112, ¶ 6.
Anywhere the term “comprising” is used, embodiments and components “consisting essentially of” and “consisting of” are expressly disclosed and described herein.”
Furthermore, the Abstract is not intended to be limiting as to the scope of the claimed subject matter and is for the purpose of quickly determining the nature of the claimed subject matter.
This present non-provisional patent application is related to and claims benefit of and priority from U.S. Provisional Patent Application Ser. No. 62/630,786 filed on Feb. 14, 2018, the entire contents of which are hereby incorporated by reference thereto.
Number | Name | Date | Kind |
---|---|---|---|
3028596 | McGillem et al. | Apr 1962 | A |
3599211 | Mardon | Aug 1971 | A |
3631484 | Angenblick | Dec 1971 | A |
3707672 | Miller et al. | Dec 1972 | A |
3732567 | Low et al. | May 1973 | A |
3795911 | Hammack | Mar 1974 | A |
3911435 | Mardon et al. | Oct 1975 | A |
3930734 | Holly et al. | Jan 1976 | A |
4035797 | Nagy | Jul 1977 | A |
4053891 | Opitz | Oct 1977 | A |
4058804 | Sawada et al. | Nov 1977 | A |
4121214 | Marinaccio et al. | Oct 1978 | A |
4239388 | Green | Dec 1980 | A |
4303910 | McCann | Dec 1981 | A |
4351029 | Maxey et al. | Sep 1982 | A |
4380172 | Imam et al. | Apr 1983 | A |
4442494 | Fromson et al. | Apr 1984 | A |
4496900 | Di Stefano et al. | Jan 1985 | A |
4614945 | Brunius et al. | Sep 1986 | A |
4648124 | Mantovani et al. | Mar 1987 | A |
4650333 | Crabb et al. | Mar 1987 | A |
4658245 | Dye et al. | Apr 1987 | A |
4726224 | D'Ausilio | Feb 1988 | A |
4827414 | Christianson et al. | May 1989 | A |
5006788 | Goulette et al. | Apr 1991 | A |
5020411 | Rowan | Jun 1991 | A |
5028866 | Wiese | Jul 1991 | A |
5073782 | Huguenin et al. | Dec 1991 | A |
5126677 | Campbell et al. | Jun 1992 | A |
5191343 | Danzer et al. | Mar 1993 | A |
5218294 | Soiferman | Jun 1993 | A |
5227800 | Huguenin et al. | Jul 1993 | A |
5251144 | Ramamurthi | Oct 1993 | A |
5265112 | Noll | Nov 1993 | A |
5270222 | Moslehi | Dec 1993 | A |
5278572 | Harada | Jan 1994 | A |
5293216 | Moslehi | Mar 1994 | A |
5300879 | Masuda et al. | Apr 1994 | A |
5302830 | Shivanandan | Apr 1994 | A |
5339080 | Steinway et al. | Aug 1994 | A |
5355227 | Ko | Oct 1994 | A |
5406209 | Johnson et al. | Apr 1995 | A |
5417494 | Kempa et al. | May 1995 | A |
5424633 | Soiferman | Jun 1995 | A |
5428556 | Torizawa et al. | Jun 1995 | A |
5517110 | Soiferman | May 1996 | A |
5537909 | Schneider et al. | Jul 1996 | A |
5539325 | Rostoker et al. | Jul 1996 | A |
5552705 | Keller | Sep 1996 | A |
5563702 | Emery et al. | Oct 1996 | A |
5578930 | Sheen | Nov 1996 | A |
5592170 | Price et al. | Jan 1997 | A |
5610705 | Brosnan et al. | Mar 1997 | A |
5631572 | Sheen et al. | May 1997 | A |
5668342 | Discher | Sep 1997 | A |
5714888 | Naujoks | Feb 1998 | A |
5719495 | Moslehi | Feb 1998 | A |
5754450 | Solomon et al. | May 1998 | A |
5764087 | Clark | Jun 1998 | A |
5798577 | Lesesky et al. | Aug 1998 | A |
5854994 | Canada et al. | Dec 1998 | A |
5900618 | Anlage et al. | May 1999 | A |
5900833 | Sunlin et al. | May 1999 | A |
5905572 | Li | May 1999 | A |
5905577 | Wilsher et al. | May 1999 | A |
5907491 | Canada et al. | May 1999 | A |
5859596 | McRae | Jun 1999 | A |
5859613 | Otto | Jun 1999 | A |
5942991 | Gaudreau et al. | Aug 1999 | A |
6027216 | Guyton | Feb 2000 | A |
6049220 | Borden et al. | Apr 2000 | A |
6049301 | Weagant | Apr 2000 | A |
6057765 | Jones et al. | May 2000 | A |
6118279 | Field et al. | Sep 2000 | A |
6124725 | Sato | Sep 2000 | A |
6137439 | Bradford et al. | Oct 2000 | A |
6144341 | Kraz | Nov 2000 | A |
6150793 | Lesesky et al. | Nov 2000 | A |
6150809 | Tiernan et al. | Nov 2000 | A |
6163259 | Barsumian et al. | Dec 2000 | A |
6236223 | Brady et al. | May 2001 | B1 |
6243036 | Chadwick et al. | Jun 2001 | B1 |
6268738 | Gunlhorpe et al. | Jul 2001 | B1 |
6281697 | Masuda et al. | Aug 2001 | B1 |
6324486 | Crook et al. | Nov 2001 | B1 |
6331782 | White et al. | Dec 2001 | B1 |
6359444 | Grimes | Mar 2002 | B1 |
6359582 | MacAleese et al. | Mar 2002 | B1 |
6363332 | Rangarajan et al. | Mar 2002 | B1 |
6375347 | Bruce et al. | Apr 2002 | B1 |
6417797 | Cousins et al. | Jul 2002 | B1 |
6455766 | Cook et al. | Sep 2002 | B1 |
6456070 | Kazama et al. | Sep 2002 | B1 |
6466882 | Kang et al. | Oct 2002 | B1 |
6480141 | Toth et al. | Nov 2002 | B1 |
6489884 | Lamberson et al. | Dec 2002 | B1 |
6489919 | Brock | Dec 2002 | B1 |
6496703 | da Silva | Dec 2002 | B1 |
6612172 | Cadet et al. | Sep 2003 | B2 |
6667711 | Joshi et al. | Dec 2003 | B1 |
6700526 | Witten | Mar 2004 | B2 |
6720905 | Levitan et al. | Apr 2004 | B2 |
6759850 | Harzanu et al. | Jul 2004 | B2 |
6759863 | Moore | Jul 2004 | B2 |
6759864 | Patel | Jul 2004 | B2 |
6765527 | Jablonski et al. | Jul 2004 | B2 |
6785553 | Chang et al. | Aug 2004 | B2 |
6825456 | Chadwick et al. | Nov 2004 | B2 |
6859285 | Chang | Feb 2005 | B1 |
6864825 | Holly | Mar 2005 | B2 |
6870889 | Sugiura | Mar 2005 | B1 |
6879167 | Ju et al. | Apr 2005 | B2 |
6894630 | Massie | May 2005 | B1 |
6897777 | Holmes et al. | May 2005 | B2 |
6911925 | Slavin | Jun 2005 | B1 |
6927579 | Blades | Aug 2005 | B2 |
6940295 | Engelbart et al. | Sep 2005 | B2 |
6947800 | Flanagan et al. | Sep 2005 | B2 |
6970762 | Elliott et al. | Nov 2005 | B1 |
6985771 | Fischell et al. | Jan 2006 | B2 |
7002470 | Miao | Feb 2006 | B1 |
7010386 | McDonnell et al. | Mar 2006 | B2 |
7034660 | Watters et al. | Apr 2006 | B2 |
7039491 | Delbrugge, Jr. et al. | May 2006 | B1 |
7046187 | Fullerton et al. | May 2006 | B2 |
7086593 | Woodard et al. | Aug 2006 | B2 |
7103460 | Breed | Sep 2006 | B1 |
7130624 | Jackson et al. | Oct 2006 | B1 |
7138963 | Duff et al. | Nov 2006 | B2 |
7142147 | Holly | Nov 2006 | B2 |
7145356 | Sang Gi | Dec 2006 | B2 |
7145453 | Miller, Jr. et al. | Dec 2006 | B2 |
7162285 | Owens et al. | Jan 2007 | B2 |
7188037 | Hidehira | Mar 2007 | B2 |
7218093 | Cirkel et al. | May 2007 | B2 |
7220990 | Aghababazadeh et al. | May 2007 | B2 |
7233285 | Struckman | Jun 2007 | B2 |
7250781 | Nakagawa et al. | Jul 2007 | B2 |
7250785 | Kawaike et al. | Jul 2007 | B2 |
7256055 | Aghababazadeh et al. | Aug 2007 | B2 |
7268728 | Struckman | Sep 2007 | B1 |
7289873 | Redecker et al. | Oct 2007 | B2 |
7328126 | Chamness | Feb 2008 | B2 |
7355417 | Shusterman et al. | Apr 2008 | B1 |
7391356 | Brumley, II et al. | Jun 2008 | B2 |
7397421 | Smith | Jul 2008 | B2 |
7424338 | Wipert | Sep 2008 | B1 |
7427947 | Dark et al. | Sep 2008 | B1 |
7454202 | de La Chapelle | Nov 2008 | B2 |
7464005 | Beetner et al. | Dec 2008 | B1 |
7466157 | Miller | Dec 2008 | B2 |
7492303 | Levitan et al. | Feb 2009 | B1 |
7512511 | Schultz et al. | Mar 2009 | B1 |
7515094 | Keller, III | Apr 2009 | B2 |
7554352 | Huie | Jun 2009 | B2 |
7609199 | Nishijima et al. | Oct 2009 | B2 |
7639178 | Mulbrook et al. | Dec 2009 | B1 |
7645982 | King | Jan 2010 | B1 |
7646005 | Chase et al. | Jan 2010 | B2 |
7671784 | Steinway et al. | Mar 2010 | B2 |
7683830 | Montgomery et al. | Mar 2010 | B2 |
7688264 | Chun | Mar 2010 | B2 |
7710131 | Tiernan | May 2010 | B1 |
7710287 | Lange et al. | May 2010 | B2 |
7777671 | Schnitzer et al. | Aug 2010 | B2 |
7777672 | Schnitzer et al. | Aug 2010 | B2 |
7778367 | Stockmaster | Aug 2010 | B1 |
7782251 | Bishop et al. | Aug 2010 | B2 |
7795596 | Chowdhury | Sep 2010 | B2 |
7844341 | Von Arx et al. | Nov 2010 | B2 |
7853437 | Seguin et al. | Dec 2010 | B2 |
7864107 | Lehtola | Jan 2011 | B1 |
7902834 | Wolfe et al. | Mar 2011 | B2 |
7928577 | Sandhu et al. | Apr 2011 | B2 |
7956617 | McCarthy et al. | Jun 2011 | B1 |
7999723 | Jung et al. | Aug 2011 | B2 |
8028208 | Moore | Sep 2011 | B2 |
8063739 | Kean | Nov 2011 | B2 |
8063813 | Keller | Nov 2011 | B1 |
8069490 | Gross et al. | Nov 2011 | B2 |
8103463 | Kalgren et al. | Jan 2012 | B2 |
8131564 | Dicks et al. | Mar 2012 | B2 |
8193819 | Wang et al. | Jun 2012 | B2 |
8294616 | Ormesher et al. | Oct 2012 | B1 |
8344745 | Aghababazadeh et al. | Jan 2013 | B2 |
8390307 | Slupsky et al. | Mar 2013 | B2 |
8537050 | Freeman et al. | Sep 2013 | B2 |
8548649 | Guyette et al. | Oct 2013 | B2 |
8643539 | Pauly et al. | Feb 2014 | B2 |
8661980 | Roemerman et al. | Mar 2014 | B1 |
8825823 | Keller, III | Sep 2014 | B2 |
8878725 | Lu | Nov 2014 | B2 |
9059189 | Keller, III et al. | Jun 2015 | B2 |
9083351 | Lee | Jul 2015 | B1 |
9205270 | Pathak et al. | Dec 2015 | B2 |
9285463 | Freeman et al. | Mar 2016 | B1 |
9443843 | Lee et al. | Sep 2016 | B2 |
10068230 | Mestre | Sep 2018 | B2 |
10235523 | Keller, III | Mar 2019 | B1 |
20010011903 | O'Neill et al. | Aug 2001 | A1 |
20010056340 | Gorin et al. | Dec 2001 | A1 |
20020011852 | Mandelis et al. | Jan 2002 | A1 |
20020024432 | Lin et al. | Feb 2002 | A1 |
20020039030 | Khazei | Apr 2002 | A1 |
20020075017 | Edwards et al. | Jun 2002 | A1 |
20020089671 | Hill | Jul 2002 | A1 |
20020121915 | Alonso Montull et al. | Sep 2002 | A1 |
20020140592 | Nguyen | Oct 2002 | A1 |
20030001596 | Suga et al. | Jan 2003 | A1 |
20030034444 | Chadwick et al. | Feb 2003 | A1 |
20030071262 | Weiner et al. | Apr 2003 | A1 |
20030126017 | Rau | Jul 2003 | A1 |
20030137318 | Enachescu et al. | Jul 2003 | A1 |
20030155927 | Pinto et al. | Aug 2003 | A1 |
20030179126 | Jablonski et al. | Sep 2003 | A1 |
20030206027 | Nozoe et al. | Nov 2003 | A1 |
20040027149 | Aitren et al. | Feb 2004 | A1 |
20040041724 | Levitan et al. | Mar 2004 | A1 |
20040078160 | Frei et al. | Apr 2004 | A1 |
20040095243 | Holmes et al. | May 2004 | A1 |
20040100280 | Ju et al. | May 2004 | A1 |
20040161062 | Richey | Aug 2004 | A1 |
20040218249 | Kochergin | Nov 2004 | A1 |
20050046430 | Kinnunen et al. | Mar 2005 | A1 |
20050064922 | Owens et al. | Mar 2005 | A1 |
20050116307 | De Jongh et al. | Jun 2005 | A1 |
20050165456 | Mann et al. | Jul 2005 | A1 |
20050207522 | Lindner | Sep 2005 | A1 |
20050265124 | Smith | Dec 2005 | A1 |
20060082488 | Keller, III | Apr 2006 | A1 |
20060103378 | Pakdaman et al. | May 2006 | A1 |
20060114157 | Kolanek et al. | Jun 2006 | A1 |
20060152232 | Shvets et al. | Jul 2006 | A1 |
20060208672 | Achenbach et al. | Sep 2006 | A1 |
20060220858 | Kawamata | Oct 2006 | A1 |
20060259082 | Youker et al. | Nov 2006 | A1 |
20070013577 | Schnitzer et al. | Jan 2007 | A1 |
20070027643 | Lesesky et al. | Jan 2007 | A1 |
20070040118 | Cheng et al. | Feb 2007 | A1 |
20070046298 | Satai et al. | Mar 2007 | A1 |
20070063886 | Brumley, II et al. | Mar 2007 | A1 |
20070069949 | Ferreol et al. | Mar 2007 | A1 |
20070120571 | Huie | May 2007 | A1 |
20070120738 | Stroud | May 2007 | A1 |
20070139247 | Brown et al. | Jun 2007 | A1 |
20070213951 | Van Eeden | Sep 2007 | A1 |
20070214133 | Liberty et al. | Sep 2007 | A1 |
20070229270 | Rofougaran | Oct 2007 | A1 |
20070234058 | White | Oct 2007 | A1 |
20070279071 | Orton | Dec 2007 | A1 |
20070282541 | Griess et al. | Dec 2007 | A1 |
20080012579 | Kuhns et al. | Jan 2008 | A1 |
20080048673 | Tan et al. | Feb 2008 | A1 |
20080094222 | Kaoru | Apr 2008 | A1 |
20080094273 | Doyen | Apr 2008 | A1 |
20080103555 | Dicks et al. | May 2008 | A1 |
20080141072 | Kalgren et al. | Jun 2008 | A1 |
20080168895 | Duong | Jul 2008 | A1 |
20080169968 | Easthope et al. | Jul 2008 | A1 |
20080177486 | Farkas | Jul 2008 | A1 |
20080204275 | Wavering et al. | Aug 2008 | A1 |
20080206718 | Jaklitsch et al. | Aug 2008 | A1 |
20080254738 | Brumley et al. | Oct 2008 | A1 |
20080259084 | Chang et al. | Oct 2008 | A1 |
20080284609 | Rofougaran | Nov 2008 | A1 |
20080297396 | Dark et al. | Dec 2008 | A1 |
20090002000 | Nikawa | Jan 2009 | A1 |
20090030487 | Lang | Jan 2009 | A1 |
20090078146 | Tepera et al. | Mar 2009 | A1 |
20090099830 | Gross et al. | Apr 2009 | A1 |
20090154589 | Monnerie | Jun 2009 | A1 |
20090196323 | McCarthy | Aug 2009 | A1 |
20090216498 | Seguin et al. | Aug 2009 | A1 |
20090218657 | Rofougaran | Sep 2009 | A1 |
20090243924 | Twitchell, Jr. et al. | Oct 2009 | A1 |
20090306920 | Zwinger et al. | Dec 2009 | A1 |
20090322585 | Galasso | Dec 2009 | A1 |
20100033386 | Lewis et al. | Feb 2010 | A1 |
20100035557 | Shellhammer | Feb 2010 | A1 |
20100039340 | Brown | Feb 2010 | A1 |
20100073229 | Pattabiraman et al. | Mar 2010 | A1 |
20100073665 | Zhao et al. | Mar 2010 | A1 |
20100097269 | Loidl et al. | Apr 2010 | A1 |
20100114216 | Krause et al. | May 2010 | A1 |
20100123453 | Pauly et al. | May 2010 | A1 |
20100125438 | Audet | May 2010 | A1 |
20100171446 | Retsky | Jul 2010 | A1 |
20100182189 | Jung et al. | Jul 2010 | A1 |
20100237854 | Kumhyr et al. | Sep 2010 | A1 |
20100241864 | Kelley et al. | Sep 2010 | A1 |
20100289686 | Jung et al. | Nov 2010 | A1 |
20100295552 | Li et al. | Nov 2010 | A1 |
20100315295 | Tucek et al. | Dec 2010 | A1 |
20100332199 | Dhanekula et al. | Dec 2010 | A1 |
20110068818 | Fukami | Mar 2011 | A1 |
20110095934 | Freeman et al. | Apr 2011 | A1 |
20110210829 | Kean | Sep 2011 | A1 |
20110235742 | London et al. | Sep 2011 | A1 |
20110246119 | Feix | Oct 2011 | A1 |
20110270337 | Doerr et al. | Nov 2011 | A1 |
20110313651 | Hyde et al. | Dec 2011 | A1 |
20110320170 | Pathak et al. | Dec 2011 | A1 |
20120007982 | Giuffrida et al. | Jan 2012 | A1 |
20120019321 | Arnborg | Jan 2012 | A1 |
20120154213 | Bull et al. | Jun 2012 | A1 |
20120161762 | Zank | Jun 2012 | A1 |
20120179812 | Keller, III | Jul 2012 | A1 |
20120223403 | Keller, III et al. | Sep 2012 | A1 |
20120226463 | Keller, III et al. | Sep 2012 | A1 |
20120297232 | Bircher | Nov 2012 | A1 |
20120307947 | Kodama | Dec 2012 | A1 |
20130002502 | Wang | Jan 2013 | A1 |
20130015053 | Benveniste | Jan 2013 | A1 |
20130050010 | Nordlander | Feb 2013 | A1 |
20130082717 | Kim et al. | Apr 2013 | A1 |
20130137066 | Pollak et al. | May 2013 | A1 |
20130229310 | Parks et al. | Sep 2013 | A1 |
20130328710 | Keller, III | Dec 2013 | A1 |
20140043184 | Malaga | Feb 2014 | A1 |
20140117095 | Choi | May 2014 | A1 |
20140218229 | Pauly et al. | Aug 2014 | A1 |
20140250309 | Dietze | Sep 2014 | A1 |
20140278214 | Broad et al. | Sep 2014 | A1 |
20140313071 | Mccorkle | Oct 2014 | A1 |
20140355774 | Quan | Dec 2014 | A1 |
20150009073 | Keller, III | Jan 2015 | A1 |
20150137830 | Keller, III et al. | May 2015 | A1 |
20150160181 | White | Jun 2015 | A1 |
20150180495 | Klippel | Jun 2015 | A1 |
20150377941 | Benedikt | Dec 2015 | A1 |
20160098561 | Keller | Apr 2016 | A1 |
20160224094 | Klein | Aug 2016 | A1 |
20160359569 | Dailey | Dec 2016 | A1 |
20170134877 | Faller | May 2017 | A1 |
20170289786 | Dishon | Oct 2017 | A1 |
20180096779 | Tsai | Apr 2018 | A1 |
20180182279 | Sakariya | Jun 2018 | A1 |
20180290549 | Forsberg | Oct 2018 | A1 |
Number | Date | Country |
---|---|---|
102005040494 | Mar 2007 | DE |
63085373 | Apr 1988 | JP |
06011530 | Jan 1994 | JP |
H11174130 | Jul 1999 | JP |
2000076387 | Mar 2000 | JP |
2003503679 | Jan 2003 | JP |
2004245709 | Sep 2004 | JP |
2011174709 | Sep 2011 | JP |
2012026913 | Feb 2012 | JP |
20090092515 | Sep 2009 | KR |
101077441 | Oct 2011 | KR |
2009047585 | Apr 2009 | WO |
2015134148 | Sep 2015 | WO |
Entry |
---|
HyperPhysics, ‘Cesium Atomic Clock’, Dec. 4, 2017, http://hyperphysics.phy-astr.gsu.edu/hbase/acloc.html, as retreived from web.archive.org at http://web.archive.org/web/20171204210104/http://hyperphysics.phy-astr.gsu.edu/hbase/acloc.html. |
Leopoldo Angrisania, Identification and classification of transformers current transients through Huang Hilbert Transform, Date Feb. 2, 2018, p. 127 Fig 7. Retrieved from: https://www.sciencedirect.com/science/article/pii/S0263224118303622?via%3Dihub. |
Tektronix, Differential Oscilloscope Measurements, Copyright 1996, p. 9 Fig 11. Retrieved from: https://studylib.net/doc/18881579/differential-oscilloscope-measurements#. |
Ashwin Lakshminarasimhan; Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking; Sep. 2011; submitted to the Graduate School of the University of Massachusetts Amherst. |
William E. Cobb et al.; Intrinsic Physical-Layer Authentication of Integrated Circuits; IEEE Transactions on Information Forensics and Security, vol. 7, No. 1 Feb. 2012. |
Y.P. Zhang, Duixian Liu; Antenna-on-Chip and Antenna-in-Package Solutions to Highly Integrated Millimeter-Wave Devices for Wireless Communications, 2009, vol. 57 No. 10. |
Walter J. Keller and Bogdan Pathak; Advanced Detection of Electronic Counterfeits; Apr. 19, 2013; Nokomis, Inc. |
John H. Marburger, III; Research Challenges in Combating Terrorist Use of Explosives in the United States; Subcommittee on Domestic Improvised Explosive Devices; Dec. 2008. |
U.S. Department of Justice; Enhanced Tools for Improvised Explosive Devices (IED) and Vehicle Borne IED Defeat; Oct. 2005. |
Number | Date | Country | |
---|---|---|---|
62630786 | Feb 2018 | US |