Publication Date: 2016-Dec-14
The IP.com Prior Art Database
Described is the design of an acoustic noise generator.
An inventive way of hacking into a computer involves sensing its acoustic emissions. The
process involves sending over known sequences of characters to the targeted computer in order
to calibrate the noise emissions. Once calibrated, a cypher attack is initiated against the target
computer and acoustic emissions monitored and decoded, resulting in compromised passwords.
The proposed concept uses a random noise generator in concert with the noise generated by the
system to thwart such an attempt.
When the computer knows it is being accessed and users are providing secure
information for access, the computer can energize a noise emitting device. This device would be
adjusted to provide sounds similar in frequency and sound power levels as a typical operating
chip. The generated noise emitted by the device would be random in nature. Its purpose is to
mask the noise coming from the chip that contains sensitive information, by interfering with it.
Previous attempts to mitigate the aforementioned problem deal with acoustic shielding among
other techniques. This method has been as follows:
One may expect that placing the machine in a noisy environment will foil the attack.
However, the energy of noise generated in a typical noisy environment (such as outdoors or a
noisy room) is typically concentrated at low frequencies, below 10 kHz. Since the acoustic
leakage is usually present well above this range, such noises can be easily filtered out during the