H04K3/80

Unauthorized electro-optics (EO) device detection and response system

A system is disclosed to identify authorized EO devices and unauthorized EO devices within a scene. The system responds with a variety of response actions including sending warning messages of the unauthorized EO devices, recording images and position of the unauthorized EO device. The system can further be configured to hamper the operation of the unauthorized EO devices detected within the scene.

INTEGRATION OF CELLULAR PHONE DETECTION AND REPORTING INTO A PRISON TELEPHONE SYSTEM
20240014920 · 2024-01-11 · ·

The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.

ELECTRONIC WARFARE SYSTEM DEVICE WITH NON-REAL-TIME THREAT SIGNAL ANALYSIS AND ELECTRONIC ATTACK FUNCTION
20200213029 · 2020-07-02 ·

Provided are electronic warfare system device including: an electronic warfare support unit for receiving a threat signal and generating a Pulse Description Word (PDW) using the received threat signal; an electronic warfare system display for downloading the PDW to perform a threat signal analysis and selecting an electronic attack technique based on the threat signal analysis; and an electronic attack unit for outputting at least one of noise jamming and deception jamming based on the electronic attack technique selected in the electronic warfare system display to perform an electronic attack.

INTEGRATION OF CELLULAR PHONE DETECTION AND REPORTING INTO A PRISON TELEPHONE SYSTEM
20200092031 · 2020-03-19 · ·

The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.

LOW-ALTITUDE UNMANNED AERIAL VEHICLE SURVEILLANCE SYSTEM
20200062392 · 2020-02-27 ·

Disclosed is a low-altitude unmanned aerial vehicle surveillance system. According to an embodiment, monitoring is performed using a balloon main body filled with gas and staying in the air; radar; camera units being provided outside the balloon main body, and including a camera taking an image of a subject; radio frequency detectors; and sound detectors and correspondingly, interceptor means is included. As interceptor means, a jammer, a jamming gun, and a spoofing device corresponding to jamming are disclosed.

Integration of cellular phone detection and reporting into a prison telephone system
10432343 · 2019-10-01 · ·

The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.

DUAL ADVANCED AUDIO DISTRIBUTION PROFILE (A2DP) SINK

Wireless communication schemes and techniques are described, wherein a secondary device is configured to eavesdrop information communicated between a source and a primary device. Secondary device transmits a NACK signal to jam ACK signals from the primary device to the audio source, forcing a retransmit of audio information from the source to the primary, and available over an eavesdropping link between the secondary device and the source.

Disruption tolerance in contested environments
10251083 · 2019-04-02 · ·

A method includes determining that a first receiver of a node of a mobile ad-hoc network (MANET) is in an electromagnetic contested environment for a first frequency. The method also includes scanning a frequency coverage range of a second receiver of the node for unused frequencies. The method additionally includes selecting a frequency from the unused frequencies, the selected frequency to be used for communication of messages from another node of the MANET to the node via the second receiver. The method further includes transmitting, to the other node, a message including information of the selected frequency via the transmitter.

Systems and methods for detecting and controlling wireless transmission devices

A method of detecting, controlling and managing transmission of a transmitting device within a facility is disclosed. The method involves transmitting information to the transmission device, detecting a response transmission from the transmission device by a least one transmission detection facility, extracting identification information associated with the transmission device in response to the transmitted information; and determining a location of the transmission device based on the response transmission received by the at least one received transmission detection facility, wherein the response transmissions are sorted by the identification information, determining an allowability of the located transmission device with the set area and interacting and manipulating transmission of the detected transmitting device.

CYBER-PHYSICAL SECURITY
20180337932 · 2018-11-22 ·

A cyber-physical security module includes an input interface configured to connect to a signal source to intercept a physical signal that is transmitted from the signal source to a signal destination. An output interface is configured to connect to the signal destination. A programmable processor is configured to receive input from an administrator device to define or modify one or a plurality of security rules. Upon interception of the physical signal via the input interface, the processor is configured to apply the security rules to authenticate the intercepted physical signal. If the intercepted physical signal is authenticated, the processor is configured to transmit the intercepted physical signal to the signal destination via the output interface.