H04K3/22

JAMMER DETECTION SYSTEM

Certain aspects of the present disclosure generally relate to jamming detection for radio frequency (RF) front-end circuitry. For example, certain aspects provide an apparatus having a first counter configured to count a number of times that a power of a reception signal exceeds a first threshold. The apparatus also includes a second counter configured to count a number of measurements of the power of the reception signal. The apparatus further includes control logic having a first input coupled to an output of the first counter and having a second input coupled to an output of the second counter. The control logic is configured to determine an amount of jamming over a measurement window based on the number of times that the power of the reception signal exceeds the first threshold and on the number of measurements.

RADIO FREQUENCY RECEIVE CHAIN CONTROL FOR RECEIVING SATELLITE POSITIONING SIGNALS
20230067256 · 2023-03-02 ·

A satellite signal processing method includes: receiving, at a user equipment, a first satellite signal of a first frequency band from at least one satellite of a constellation of satellites; receiving, at the user equipment, a second satellite signal of a second frequency band and from the at least one satellite of the constellation of satellites; and controlling an activation status of at least one of: a first satellite signal receive chain, of the user equipment, configured to measure the first satellite signal; or a second satellite signal receive chain, of the user equipment, configured to measure the second satellite signal.

Real-time detection of interfering device

In the method, a first device receives a mixed signal including a target signal from a target device among a plurality of second devices and an interfering signal from the plurality of second devices. The first device determines a distribution characteristic of an amplitude of the mixed signal within an amplitude variation range, the distribution characteristic being associated with the target device and an interfering device generating the interfering signal. The first device determines the interfering device from the plurality of second devices based on the distribution characteristic. An interfering device in a communication system may be detected in real-time and accurately.

INTERFERENCE DETECTION IN A GNSS SIGNAL
20230067684 · 2023-03-02 · ·

An interference detector for detecting interference in Global Navigation Satellite System (GNSS) includes an RF splitter, multiple detectors and a comparator. RF splitter, splits a radio frequency (RF) input signal into multiple RF output signals which are provided to respective detectors. Each of the detectors includes a bandpass filter and a peak detector. The bandpass filter filters the RF output signal into a respective GNSS frequency band and the peak detector detects the peak level of the filtered RF signal. The comparator analyzes the peak detector outputs and identifies whether interference is present in the GNSS frequency bands by comparing the peak levels to respective thresholds. Based on this analysis, the comparator outputs a signal that indicates the presence and absence of identified interference in the GNSS frequency bands.

Communication of navigation data spoofing between unmanned vehicles

Techniques for determining whether data associated with an autonomous operation of a first unmanned vehicle may be trusted. For example, the first unmanned vehicle may receive an indication related to the data and originating from a second unmanned vehicle over a network. For instance, the indication may indicate that similar data for a similar autonomous operation of the second unmanned vehicle may be untrusted. Based on a level of trust accorded to the indication, the first unmanned vehicle may determine that the data may be untrusted and the autonomous navigation may be directed independently of the data.

DETECTION METHOD OF DECOYING OF A TRAFFIC ALERT AND COLLISION AVOIDANCE SYSTEM, AND ASSOCIATED TRAFFIC ALERT AND COLLISION AVOIDANCE SYSTEM
20230196927 · 2023-06-22 ·

Disclosed is a method of detecting spoofing of a traffic alert and collision avoidance system, known as a TCAS, the TCAS having a Mode A, a Mode C and a Mode S for communicating with surrounding aircraft. The method includes: querying a suspected spoofing aircraft via Mode S of the TCAS and receiving a response to this query; deducing from the response at least some data, known as Mode S data, relating to the suspected spoofing aircraft; and validating Mode S data by querying the suspected spoofing aircraft via Mode A or Mode C of the TCAS.

Method of detecting a jamming transmitter affecting a communication user equipment, device and user equipment and system with the user equipment
09844016 · 2017-12-12 · ·

A method of detecting a jamming transmitter includes the steps of indicating that a communication user equipment is capable of communicating in a cellular code division multiple access based radio network; testing a match of a uniform synchronization signal sequence of a synchronization channel; detecting a power indicator indicative of an unbiased wide band power of a received radio signal strength and comparing the power indicator to a noise floor threshold; and indicating a jamming affection of the communication user equipment in the case where (i) the communication indication is on hold; and (ii) the uniform synchronization sequence of the synchronization channel is not matched in the test, and (iii) the power indicator exceeds the noise floor threshold.

Wavelet transformation based anti-jam processing techniques
09838151 · 2017-12-05 · ·

Wavelet transformation based anti-jam processing methods and systems are disclosed. An anti-jam processing method may include: generating a wavelet transformation for a unit of a received signal; weighting each element in the wavelet transformation to generate a weighted wavelet transformation; evaluating jammer suppression performances of a plurality of time and frequency resolution levels defined for an inverse wavelet transformation; selecting a particular time and frequency resolution level among the plurality of time and frequency resolution levels; and applying the inverse wavelet transformation to the weighted wavelet transformation, wherein the inverse wavelet transformation is applied based on the particular time and frequency resolution level selected.

Systems and methods for detecting wireless communication jamming in a network

An electronic device may include a processor and a network interface that may include a first radio and a second radio. The processor may be configured to perform wireless communication jamming attack detection by occasionally performing clear channel verification utilizing the network interface to determine whether a threshold number of devices' channels are incapacitated in a wireless network within a threshold amount of time and/or by sending a heartbeat signal from the first radio and determining whether the second radio received the heartbeat signal.

Security monitoring for optical network

Apparatus (10) for an optical communications network has optical paths for optical traffic, and optical ports (20,40), one of which is an unused input port (20). A security monitoring system (30) has a blocking part (50) comprising an interface (51) coupled removably to the unused input port (20) to occupy it to prevent unauthorized access. A light source is optically coupled to the interface (51) such that, when the interface is coupled to the unused input port, light can be transmitted through the interface (51) into the unused input port (20). An optical detector (60) can detect light reflected back from the interface (51), and there is alarm circuitry (70) configured to output an alarm signal based on the detecting of the reflected light. This monitoring can help make the node more secure from interference such as the introduction of a noise signal. The system can be passive or active, and does not require a change in the installed node configuration and so can be added easily to existing infrastructure.