Patent classifications
G07C2209/61
Radio frequency device detection and intervention
Systems, devices and methods are disclosed for detecting, characterizing and engaging unmanned vehicles. In one aspect, a method includes detecting an object, such as an unmanned aerial, land or aquatic vehicle that communicates using a radio control (RC) communications protocol, traveling to a zone including scanning one or more frequencies of RF signals; analyzing one or both of time and frequency information of the RF signals to characterize the detected object; and engaging the detected object as an authorized or unauthorized object in the monitored zone.
VEHICLE PASSIVE ENTRY/PASSIVE START SYSTEM
A combined vehicle passive entry/passive start (PEPS) and mobile electronic device wireless charging system. The system includes a vehicle transmitter configured to transmit a signal in accordance with a wireless charging protocol. The signal is transmitted through a first wireless communications channel for receipt by a mobile electronic device. A vehicle receiver is configured to receive response data from the mobile electronic device through a second wireless communications channel. The response data is generated by the mobile electronic device in response to receipt of the signal transmitted by the vehicle transmitter. A vehicle processor module is configured to at least one of unlock doors of the vehicle and start the vehicle in response to receipt of the response data by the vehicle receiver.
Ultra-wide band device for access control reader system
A device connectable to a reader of an access control system includes an antenna, an ultra-wide band (UWB) front end circuit, a controller, and a communication link. The (UWB) front end circuit is connected to the antenna to facilitate UWB communication with a credential device. The controller is connected to the UWB front end and configured to perform ranging for the credential device using the UWB communication. The communication link is configured to interface with the reader.
Detection And Protection Against Jam Intercept And Replay Attacks
Method and apparatus are disclosed for detection and protection against jam intercept and replay attacks. An example disclosed key fob includes a first wireless transceiver tuned to communicate via a first frequency band, second wireless transceiver tuned to communicate via a second frequency band, and a communicator. The first frequency band is different than the second frequency band. The example communicator sends a first message via the first wireless transceiver in response to activation of a first button. Additionally, the example communicator, in response to not receiving a second message via the second wireless transceiver, provides an alert.
RADIO FREQUENCY DEVICE DETECTION AND INTERVENTION
Systems, devices and methods are disclosed for detecting, characterizing and engaging unmanned vehicles. In one aspect, a method includes detecting an object, such as an unmanned aerial, land or aquatic vehicle that communicates using a radio control (RC) communications protocol, traveling to a zone including scanning one or more frequencies of RF signals; analyzing one or both of time and frequency information of the RF signals to characterize the detected object; and engaging the detected object as an authorized or unauthorized object in the monitored zone.
RADIO FREQUENCY DEVICE DETECTION AND INTERVENTION
Systems, devices and methods are disclosed for detecting, characterizing and engaging unmanned vehicles. In one aspect, a method includes detecting an object, such as an unmanned aerial, land or aquatic vehicle that communicates using a radio control (RC) communications protocol, traveling to a zone including scanning one or more frequencies of RF signals; analyzing one or both of time and frequency information of the RF signals to characterize the detected object; and engaging the detected object as an authorized or unauthorized object in the monitored zone.
Passive Entry/Passive Start Access Systems Including Round Trip Time Sniffing
A system for includes master and sniffer devices. The master device includes: first antennas with different polarized axes; a transmitter transmitting a challenge signal via the first antennas from the vehicle to a slave device, where the slave device is a portable access device; and a receiver receiving a response signal in response to the challenge signal from the slave device. The sniffer device includes: second antennas with different polarized axes; and a receiver receiving, via the second antennas, the challenge signal from the transmitter and the response signal from the slave device. The sniffer device measures when the challenge signal and the response signal arrive at the sniffer device to provide arrival times. The master or sniffer device estimates at least one of a distance from the vehicle to the slave device or a location of the slave device relative to the vehicle based on the arrival times.
PHYSICAL ACCESS CONTROL SYSTEMS WITH LOCALIZATION-BASED INTENT DETECTION
A method including authenticating, by an access control system, a credential of a mobile device over a Bluetooth communication connection established between the mobile device and the access control system; receiving, via a reader of the access control system during a UWB ranging session between the mobile device and the reader, UWB data indicative of a location of the mobile device relative to the reader; determining, by the access control system, whether a user of the mobile device intends to access an asset secured by the access control system based on the UWB data and satisfying one or more intent criteria; and performing, by the access control system, a predefined function in response to determining that the user of the mobile device intends to access the asset.
Reader coordination for access control
Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility, receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.
Use of a biphase code matched filter to receive protocols with code violations
In accordance with various example embodiments, a method of receiving a protocol in the receiver, wherein the legacy protocol includes non-biphase encoded information, decoding the legacy protocol using a biphase decoder to produce a detected code, and correlating the detected code with a known code to verify the non-biphase encoded information.