H04K3/22

NETWORK JAMMING DETECTION AND REMEDIATION
20200250957 · 2020-08-06 ·

Methods and systems for remediation of jammed networks are provided. Exemplary methods include determining by a base unit of a jammed network and if outside connectivity available. The connectivity can include wired and wireless broadband networks. If connectivity is available, at least one external service is notified. Further, a user device can be notified. A local alert can be generated in the form of a phone call or test message. Also, a local action can be taken. Information associated with the jammed network is stored for later delivery if connectivity is not available where the base unit is located in a residence. Further, an alert can be issued in response to the detected network jamming, the alert being at least one of: sounding an audible alarm, showing a visual alarm indication, communicating with law enforcement, and communicating with an alarm monitoring station.

Tamper security systems and methods for vehicles

A passive entry/passive start (PEPS) system includes a communication gateway configured to transmit a ping signal based on at least one of a predetermined period and a predetermined transmission power level. The PEPS system includes at least one sensor configured to receive the ping signal and measure a physical characteristic of the ping signal. The PEPS system includes a central module configured to receive the measured physical characteristic of the ping signal, determine a lower threshold and an upper threshold associated with the at least one sensor, and compare the measured physical characteristic of the ping signal to the lower threshold and the upper threshold. In response to determining that the measured physical characteristic is less than the lower threshold and greater than the upper threshold, the central module is further configured to notify a portable device that the at least one sensor has been tampered with.

SERVICE FOR REAL-TIME SPOOFING/JAMMING/MEACONING WARNING

A method is disclosed that includes obtaining one or more pieces of threat information indicative of a data set enabling positioning based on radio signals sent by a respective radio node. The data set is further indicative of one or more parameters based on which said positioning is performed and/or controlled and which is considered to be at least partially unexpected. The method also includes utilizing the one or more pieces of threat information in a positioning. In order to obtain the one or more pieces of threat information, the method includes at least one of: obtaining the one or more pieces of threat information by using an application programming interface; or obtaining the one or more pieces of spoofing information by using a push method. A corresponding apparatus, computer-readable storage medium and system are also disclosed.

Method for Locating a terrestrial transmitting source of an unknown signal

A method for locating a terrestrial transmitting source of an unknown signal that is transmitted via satellite to a terrestrial receiver, wherein the method includes comparing a power fluctuation of the unknown signal with a power fluctuation of at least one known signal allocated to a terrestrial transmitting source and determining a degree of similarity between the power fluctuation of the unknown signal and the power fluctuation of the at least one known signal.

REINFORCEMENT LEARNING BASED COGNITIVE ANTI-JAMMING COMMUNICATIONS SYSTEM AND METHOD

Systems and methods of using machine-learning in a cognitive radio to avoid a jammer are described. Smoothed power spectral density is used to detect activity in a sub-band and basic characteristics of different signals therein extracted. If unable to classify the signals as either a valid signal or a jammer using the basic characteristics, ANN-based classification with cumulants features of the signals is used. Multiple periods are used to train sensing and communications (S/C) polices to track and avoid a jammer using RL (e.g. Q learning). The ANN has input neurons of higher order cumulants of a sensing channel and a single output neuron. The S/C polices are coupled during training and communication using negative or decreasing rewards based on the time the sensing policy takes to determine jammer presence and that the cognitive radio is jammed. A feedback channel provides a new communications channel to a radio transmitting to the cognitive radio.

TRUSTED MONITORING SYSTEM AND METHOD
20200118405 · 2020-04-16 ·

Methods and apparatus for monitoring remotely located objects with a system including at least one master data collection unit, remote sensor units, and a central data collection server are described. The master unit is configured to monitor any object, mobile or stationary, including monitoring multiple remote sensor units associated with the monitored objects. The master unit may be in a fixed location or attached to a mobile object. The master unit is configured for monitoring objects that enter and leave an area. The master unit may act as a parent controller for one or more child devices including remote sensors or monitors of measurable conditions including environmental conditions, substance identification, product identification, and/or biometric identification. The master unit may discover remote sensor units as they enter or leave the area where the master unit is located. The master unit can be remotely reprogrammed such as with authenticated instructions.

AIRCRAFT FLIGHT CONTROL APPARATUS, AIRCRAFT FLIGHT CONTROLLING METHOD, AND NON-TRANSITORY STORAGE MEDIUM
20200096645 · 2020-03-26 ·

An aircraft flight control apparatus includes a flight track acquiring unit and a determining unit. The flight track acquiring unit is configured to measure a position of an aircraft to acquire a flight track of the aircraft. The determining unit is configured to determine, when an own-aircraft deviation amount gradually increases, whether the aircraft receives a spoofed signal as a satellite positioning system signal, on the basis of the own-aircraft deviation amount. The own-aircraft deviation amount is an amount of deviation of the flight track acquired by the flight track acquiring unit from a scheduled flight route of the aircraft.

METHOD FOR PROCESSING RADIO FREQUENCY INTERFERENCE, AND ELECTRONIC DEVICE
20200092016 · 2020-03-19 ·

The present disclosure provides a method for radio frequency interference processing, comprising acquiring a first signal strength value of the first radio frequency antenna; determining whether the first signal strength value is lower than a preset threshold; and stopping the information display on the first area when the first signal strength value is lower than the preset threshold. The method reduces the interference from display components to radio frequency components, improve the efficiency of radio frequency communication.

Method of managing transmission resources in infrastructure
10577002 · 2020-03-03 · ·

The present invention relates to a method of managing transmission resources in an infrastructure (INF) comprising a plurality of wayside radio units (WRU). The method comprising: an exchange step during which a reference WRU receives cooperation data generated by one or more other WRUs, which are representative of respective failure probabilities of at least part of devices of communication onboard vehicles which are in communication with said WRU, an optimization step during which said reference WRU determines, based on the cooperation data, a resource allocation scheme defining at least time-frequency resources allocated to all or part of the devices which are in communication with said reference WRU, said resource allocation scheme being configured to maximize the probability that no transmission failure between a device and a WRU in communication therewith occurs for at least one device of each communication system across the set of devices including the devices in communication with said reference WRU and the devices for which cooperation have been received during the exchange step, an operation step, wherein said resource allocation scheme is implemented by said reference WRU.

Detecting Timing Anomalies
20200049834 · 2020-02-13 ·

Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system by detecting timing anomalies between timing signals. An embodiment operates by analyzing first timing data accessed from a validated source and second timing data accessed from an unvalidated receiver source in order to compute a threat detection value, which is utilized to determine if there is a discrepancy or anomaly in the timing or frequency of either the validated and unvalidated sources.