Patent classifications
H04K3/40
CONCEALED JAMMING ATTACH APPARATUS AND METHOD WHICH USE FALSE ACKNOWLEDGEMENT FRAME
According to one embodiment of the present invention, in a concealed jamming attack using a false acknowledgement frame, a jamming attack is performed at a point in time during which a data frame is transmitted between a transmission node and a reception node and a false acknowledgement frame is transmitted to the data frame transmission node, such that the data frame transmission node cannot detect a data transmission failure in a MAC layer because of the jamming attack, and thus a jamming attack can be concealed.
Method and apparatus for physical layer security communication in wireless communication system
An operation method of a terminal in a wireless communication system includes receiving a preamble sequence from a base station; estimating a UL channel between the terminal and the base station based on the preamble sequence; determining a first frequency region for transmitting a data signal and a second frequency region for transmitting a jamming signal in an entire frequency region of the UL channel based on a result of estimating the UL channel; and transmitting to the base station a UL control signal including identification information for identifying the first frequency region and the second frequency region.
Method for jamming synthetic aperture radars and associated device
A method for jamming airborne SAR radar implemented by a jamming device includes at least two cooperating units surrounding an area on the ground to be protected, at least two units providing a radar-detection function and at least one unit providing a radar-jamming function, each unit being interlinked by a two-way data link and being synchronized by a common clock, the method comprises a step of identifying the signals received and whether the received signals correspond to SAR signals; a step of characterizing the received SAR signal over a short duration; a step of computing a filter adapted to the signal; a step of carrying out pulse compression of the signal; a step of iteratively periodically characterizing the signal over a long duration; a step of computing the jamming signals to be transmitted; a step of transmitting the jamming signals.
INTEGRATION OF CELLULAR PHONE DETECTION AND REPORTING INTO A PRISON TELEPHONE SYSTEM
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
INTEGRATION OF CELLULAR PHONE DETECTION AND REPORTING INTO A PRISON TELEPHONE SYSTEM
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
METHOD AND APPARATUS FOR PHYSICAL LAYER SECURITY COMMUNICATION IN WIRELESS COMMUNICATION SYSTEM
An operation method of a terminal in a wireless communication system includes receiving a preamble sequence from a base station; estimating a UL channel between the terminal and the base station based on the preamble sequence; determining a first frequency region for transmitting a data signal and a second frequency region for transmitting a jamming signal in an entire frequency region of the UL channel based on a result of estimating the UL channel; and transmitting to the base station a UL control signal including identification information for identifying the first frequency region and the second frequency region.
Integration of cellular phone detection and reporting into a prison telephone system
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
Blocking the capture of photo and video content
In an approach for blocking a user from the capture of a photograph without consent, a processor receives an indication that a user has entered a location. A processor projects a hologram that blocks the user from photo capture. A processor detects images within the defined location, wherein the images include a person. A processor evaluates an authorization to capture a photo by the person. A processor evaluates a current contextual condition of the user to allow for photo capture. A processor alter the hologram, based on the evaluated authorization to capture the photo by the person and the evaluated current contextual condition of the user to allow for photo capture.
System, method, and apparatus for reducing driving while texting
A system for reducing driving while texting includes a containment vessel with a door. When the door is closed, the containment vessel attenuates cellular radio signals to prevent the user device held there within from communicating with a transceiver that is external to the containment vessel (e.g. Cell Tower). A transceiver having an antenna internal to the containment vessel looks for a transceiver of the user device to detect the presence of the user device within the containment vessel. A sensor detects when the door is closed. There is a way to detecting movement of a vehicle in which the containment vessel is held and a way to log data indicating at least time periods in which movement is detected and either the door is open or the transceiver of the user device is not detected. The data is reported (e.g. to a parent/guardian).
System, method, and apparatus for reducing driving while texting
A system for reducing driving while texting includes a containment vessel with a door. When the door is closed, the containment vessel attenuates cellular radio signals to prevent the user device held there within from communicating with a transceiver that is external to the containment vessel (e.g. Cell Tower). A transceiver having an antenna internal to the containment vessel looks for a transceiver of the user device to detect the presence of the user device within the containment vessel. A sensor detects when the door is closed. There is a way to detecting movement of a vehicle in which the containment vessel is held and a way to log data indicating at least time periods in which movement is detected and either the door is open or the transceiver of the user device is not detected. The data is reported (e.g. to a parent/guardian).