H04K3/80

Dual advanced audio distribution profile (A2DP) sink

A wireless system includes a first device in operative communication with an master device over a first link, and a second device to eavesdrop transmissions from the master device to the first device. The wireless system, based on a reference clock signal, adjusts at least one of a first clock signal for the first link and a second clock signal for a second link between the second device and the first device.

INTEGRATION OF CELLULAR PHONE DETECTION AND REPORTING INTO A PRISON TELEPHONE SYSTEM
20180159653 · 2018-06-07 · ·

The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.

Integration of cellular phone detection and reporting into a prison telephone system
09887800 · 2018-02-06 · ·

The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.

Integration of cellular phone detection and reporting into a prison telephone system
12199748 · 2025-01-14 · ·

The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.

System and method for jamming cellular signals using aerial vehicles
09860014 · 2018-01-02 · ·

A system and method for jamming cellular signals using aerial vehicles is provided. In a preferred embodiment, the aerial vehicles are unmanned aerial vehicles. A plurality of aerial vehicles are coordinated together to send signals to a predetermined area to jam the cellular network.

DUAL ADVANCED AUDIO DISTRIBUTION PROFILE (A2DP) SINK

Wireless communication schemes and techniques are described, wherein a secondary device is configured to eavesdrop information communicated between a source and a primary device. Secondary device transmits a NACK signal to jam ACK signals from the primary device to the audio source, forcing a retransmit of audio information from the source to the primary, and available over an eavesdropping link between the secondary device and the source.

Systems and methods for detecting and controlling wireless transmission devices

Disclosed is a system for managing wireless transmitting devices in which a wireless transmission from a transmission device is detected within or about a set area and an allowability of the transmission device to continue transmitting is based on an identification information, of the device, a location of the device and a number being called by the device.

Machine-learning based analysis and response based on electromagnetic waveforms and sensor data
12267155 · 2025-04-01 · ·

A method includes determining, based at least in part on parameters of a software defined radio (SDR), waveform data descriptive of an electromagnetic waveform. The method also includes obtaining sensor data distinct from the waveform data. The method further includes generating feature data based on the sensor data and the waveform data and providing the feature data as input to a first machine learning model and initiating a response action based on an output of the first machine learning model.

Managed access system with mobile wireless device geolocation capability
09584252 · 2017-02-28 · ·

A managed access system for mobile wireless devices (MWDs) in a facility that is geographically within a wireless communications network includes a plurality of antennas arranged at the facility. Radio equipment is coupled to the antennas. A management access controller cooperates with the radio equipment to communicate with a given MWD within the facility, block outside communications via the wireless communications network when the given MWD is an unauthorized MWD, and provide outside communications when the given MWD is an authorized MWD. The management access controller cooperates with at least one MWD geolocation device to locate the given MWD within the facility.

Disruption Tolerance in Contested Environments
20170041822 · 2017-02-09 · ·

A method includes determining that a first receiver of a node of a mobile ad-hoc network (MANET) is in an electromagnetic contested environment for a first frequency. The method also includes scanning a frequency coverage range of a second receiver of the node for unused frequencies. The method additionally includes selecting a frequency from the unused frequencies, the selected frequency to be used for communication of messages from another node of the MANET to the node via the second receiver. The method further includes transmitting, to the other node, a message including information of the selected frequency via the transmitter.