Patent classifications
H04K3/00
PHYSICAL LAYER SECURITY ACTIVATION
Methods, systems, and devices for wireless communications are described. In some wireless communications systems, a user equipment (UE) may receive, from a base station, control signaling identifying a configuration of a set of time intervals for communication with the base station, the set of time intervals including a subset of the time intervals for which the UE is to perform a physical layer security procedure. In some cases, the UE may activate a timer associated with performing the physical layer security procedure in response to a trigger. The UE and the base station may communicate one or more messages using the physical layer security procedure, for example, in the subset of the time intervals identified by the control signaling, while the timer is active, or both. The physical layer security procedure may involve the UE performing physical layer security encoding, signal jamming, or both.
WEARABLE MICROPHONE JAMMER
A microphone jammer includes a base and a signal generator mounted to the base. The signal generator is configured to generate an ultrasonic signal. The jammer also includes one or more transducers mounted to the base and configured to transmit the ultrasonic signal. The one or more transducers are mounted in a curved layout about the base.
System and method for small unmanned aerial systems (sUAS) defense
Provided is a method and a computer device for performing the method for defending a perimeter against a small unmanned aerial system (sUAS). The method includes detecting a presence of a wireless access point (WAP) associated with a sUAS; analyzing data packets intercepted from the WAP; determining the type of sUAS based on the data packets that were intercepted using a machine learning classifier; determining one or more exploits from a library of exploits to initiate against the sUAS based on the type of sUAS determined by the machine learning classifier; and transmitting the one or more exploits to the sUAS.
Remote slowing or stopping a progress of a drone towards a target
Systems, and method and computer readable media that store instructions for slowing or stopping a progress, towards a target, of a drone controlled by a remote control unit.
Method and device for detecting a decoy operation of a GNSS system
A method of detecting an operation to spoof a first positioning device carried by a first vehicle moving in a zone in which at least one second vehicle carrying a second positioning device is also moving, the method comprising the step of causing at least one first positioning value to be calculated for each vehicle from initial satellite signals received by each device; the method being characterized in that it further comprises the steps of: causing the second device to initiate a latching stage in order to make a new search for satellite signals and using the new satellite signals received by the second device to calculate a second positioning value for the second vehicle at the same instant as the first value; comparing the first and second values relating to the second vehicle; and issuing a warning when the two values do not coincide.
System and method for nulling or suppressing interfering signals in dynamic conditions
A system and method for nulling or suppressing interfering signals directed toward moving platforms based, at least in part, on dynamic motion data of the moveable platform is provided. The system may be an interference nulling system carried by a moveable platform and may include an antenna array including two or more antenna elements that generates at least one initial steerable null radiation pattern, dynamic motion data logic that determines dynamic motion data of the moveable platform; and update logic that updates the at least one initial steerable null radiation pattern based, at least in part, on the dynamic motion data. The at least one updated steerable null radiation pattern is directed toward a direction from which interfering signals are being transmitted from an interfering signal source.
Radio frequency deception network
A distributed transmit platform deception network array system includes a plurality of platforms; each platform comprising at least one transmitter; wherein the platforms are in a geographically distributed configuration with respect to each other and at least one victim receiver; a propagating wavefront is generated by the transmitters of the plurality of platforms toward the at least one victim receiver according to deception target characteristics for each identified victim receiver; whereby the propagating wavefront is controlled, and a false location is determined by the victim receiver, Whereby detection of a deception at alternate receiver locations is minimized by selection of characteristics of the transmitted waveform.
RADIO FREQUENCY RECEIVE CHAIN CONTROL FOR RECEIVING SATELLITE POSITIONING SIGNALS
A satellite signal processing method includes: receiving, at a user equipment, a first satellite signal of a first frequency band from at least one satellite of a constellation of satellites; receiving, at the user equipment, a second satellite signal of a second frequency band and from the at least one satellite of the constellation of satellites; and controlling an activation status of at least one of: a first satellite signal receive chain, of the user equipment, configured to measure the first satellite signal; or a second satellite signal receive chain, of the user equipment, configured to measure the second satellite signal.
UNSTABLE JAMMING SIGNAL DETECTION
A method for inhibiting jammed signal use includes: receiving a desired signal wirelessly at a receiver; receiving an undesired signal wirelessly at the receiver, the undesired signal varying in strength over time; and inhibiting measurement of the desired signal, or use of a measurement of the desired signal, based on a determination that the undesired signal is a jamming signal based on a variation of the undesired signal being indicative of jamming.
Cooperative monitoring networks
An electronic monitoring system is described that receives data from a particular monitoring system, receives data from multiple other monitoring systems, analyzes data received from the particular monitoring system irrespective of data received from the multiple other monitoring systems, based on the analysis, determines whether one or more events occur at the particular environment, and in response to determining that a particular event occurs at the particular environment, evaluates the particular event against a set of rules, selects, based on the evaluation results, a particular subset of the multiple other monitoring systems to serve as a cooperative monitoring network, assesses data received from the particular subset of the multiple other monitoring systems, based on the assessment, tracks, in connection with the particular event, events detected by the particular subset of the multiple other monitoring systems, and handles the particular event based on the tracked events.