Patent classifications
H04K3/40
Primary user emulation / signal jamming attack detection method
The method of the invention is related to utilizing the convergence patterns of sparse coding for detecting a primary user emulation/signal jamming attack in a cognitive radio setting. The method basically comprises a training stage and a testing stage. Through the method, the hypothesis which shows that there is no primary user but only noise (H.sub.0), the hypothesis which shows that there is a legitimate primary user present with a right to use the spectrum and the secondary user should not use the spectrum (H.sub.1), and the hypothesis which shows that there is a primary user emulator/signal jammer in the environment (H.sub.2) can be distinguished.
Integration of cellular phone detection and reporting into a prison telephone system
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
Electronic countermeasures transponder system
A system is provided that has an ECM (electronic counter measures) system and a transponder monitor connected to or forming part of the ECM system. The system monitors for a transponder signal from a remote transponder. The system determines information, such as transponder location, based on the transponder signal and makes use of the information in the ECM system and/or the system extracts encoded information contained in the transponder signal, such as information about a transponder owner, such as status of consumables, medical status. The ECM system may have a reactive jammer that is used both for a reactive jamming function, and as the transponder monitor function.
LOW CAPACITANCE, SHIELDED, WATERTIGHT DEVICE INTERCONNECT
A shielded electronic array is provided and includes a main plate having opposing first and second major surfaces, first and second electronic devices disposed on respective first portions of the first and second major surfaces, respectively, a noise-shielding plate disposed on a second portion of the second major surface, an insulated eyelet, which is press-fittable into the main and noise-shielding plates and first and second wiring components. The first wiring component extends along a main plate plane from the second electronic device. The second wiring component extends from the first wiring component to the first electronic device and has an exposed first portion and a second portion extending through the insulated eyelet.
MONITORING DEVICE, MONITORING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
A monitoring device (100) includes a communication connection unit (124). The communication connection unit (124) repeatedly executes connection to an unauthorized AP when the unauthorized AP exists in its surroundings, in order to fill simultaneous connection slots of the unauthorized AP, using each device identification information of one or more pieces of device identification information generated not to overlap each other. When connection to the unauthorized AP fails, the communication connection unit (124) connects to the unauthorized AP using device identification information of a damaged CL connected to the unauthorized AP, so as to disconnect communication connection between the unauthorized AP and the damaged CL, and connects to the unauthorized AP using other device identification information, in order to fill vacant simultaneous connection slots of the unauthorized AP that have become available due to disconnection of the communication connection.
ANALOG JAMMER DETECTION FOR AUTOMATIC GAIN CONTROL (AGC)
Certain aspects of the present disclosure are directed towards techniques and apparatus for wireless communication. An example apparatus generally includes: a processor comprising a gain control component, a receive chain coupled to the processor and comprising an amplifier, and a first signal detector coupled to the receive chain and including an input coupled to an input or an output of the amplifier, wherein the gain control component includes a first input coupled to an output of the first signal detector and an output coupled to a gain control input of the amplifier.
SYSTEM AND METHOD FOR PRECISION BLOCKING OF PERSONAL AREA NETWORK PICONETS
A method and apparatus for precision blocking in Bluetooth target piconets is described. A Bluetooth monitoring station is used to receive packets on all 79 channels simultaneously. The address codes for a set of target piconets may be received. The access codes are decoded and examined for all received packets. If a set of packets is identified from the received packets, each identified packet having an access code within the set of target access codes, a blocking transmission is sent on that same channel of the identified packet. A start time of the blocking transmission is determined based on a start time of the identified packet, and the blocking transmission is initiated at the estimated start time on the channel, so as to cause a denial of service or a service degradation to that piconet.