H04K3/42

Establishing a secure uplink channel by transmitting a secret word over a secure downlink channel
10608999 · 2020-03-31 · ·

An apparatus includes a Base Station (BS) that includes an antenna array and circuitry. The antenna array is configured to transmit downlink transmissions and to receive uplink transmissions. The circuitry is configured to generate secret bits to be used for securing uplink transmissions from legitimate user devices, and to distribute the secret bits over one or more data streams destined to the legitimate user devices, to further generate one or more jamming streams, and to apply to the jamming streams beamforming that directs the jamming streams away from the legitimate user devices, to transmit the data streams and the jamming streams using the antenna array, to receive, via the antenna array, data that was encrypted by a legitimate user device based on the secret bits, and to recover the data by decoding the encrypted data using the secret bits.

UNMANNED AERIAL VEHICLE JAMMER
20200083979 · 2020-03-12 ·

An aerial vehicle system is comprised of a detector, a signal generator, and a transmitter. The detector is configured to detect a presence of a target unmanned aerial vehicle within a range of the aerial vehicle system. The signal generator is configured to generate a communication disruption signal. The transmitter is configured to trigger a transmission of the communication disruption signal based in part on the detected presence of the target unmanned aerial vehicle.

Dual-grip portable countermeasure device against unmanned systems

A portable countermeasure device is provided comprising one or more directional antennae, one or more disruption components and at least one activator. The portable countermeasure device further comprises a body having a dual-grip configuration, with the directional antennae are affixed to a removable plate on a front portion of the body. The one or more disruption components may be internally mounted within the device body. The dual-grip configuration allows an operator to use his body to steady and support the device while maintaining the antenna on target. The second grip is positioned adjacent the first grip, with the first grip angled toward the rear of the device and the second grip angled toward the front of the device. The portable countermeasure device is aimed at a specific drone, the activator is engaged, and disruptive signals are directed toward the drone, disrupting the control, navigation, and other signals to and from the drone.

Method, computer program and device for reducing interference of temporary communication resources used for wireless communication between a transportation vehicle key and a transportation vehicle

A method, a computer program, and a device for reducing interference of temporary communication resources used for a wireless communication between a transportation vehicle key and a transportation vehicle. The method includes determining whether interference of the temporary communication resources is present and switching off the device causing the interference or adjusting the use of the temporary communication resources for the wireless communication between the transportation vehicle key and the transportation vehicle in response to interference being present.

Portable countermeasure device against unmanned systems

A portable countermeasure device is provided comprising one or more directional antennae, one or more disruption components and at least one activator. The portable countermeasure device further comprises a body, with the directional antennae are affixed to a front portion of the body. The one or more disruption components may be externally or internally mounted to the device body. The portable countermeasure device is aimed at a specific drone, the activator is engaged, and disruptive signals are directed toward the drone, disrupting the control, navigation, and other signals to and from the drone.

Ultrasonic attack prevention for speech enabled devices

Techniques are provided for defending against an ultrasonic attack on a speech enabled device. A methodology implementing the techniques according to an embodiment includes detecting voice activity in an audio signal received by the device and generating an ultrasonic jamming signal in response to the detection. The jamming signal is broadcast over a loudspeaker for up to the duration of the detected voice activity to defend against the ultrasonic attack. According to another embodiment, the ultrasonic jamming signal is generated in response to detection of a wake-on-voice key phrase in the received audio signal, and the jamming signal is broadcast over the loudspeaker for a time duration selected to be less than or equal to a time window during which spoken commands are accepted by the device following the wake-on-voice key phrase detection. The jamming signal may include white or colored noise, combinations of tones, and/or a periodic sweep frequency.

Sound masking system

A sound masking system according to the invention is disclosed in which one or more sound masking loudspeaker assemblies are coupled to one or more electronic sound masking signal generators. The loudspeaker assemblies in the system of the invention have a low directivity index and preferably emit an acoustic sound masking signal that has a sound masking spectrum specifically designed to provide superior sound masking in an open plan office. Each of the plurality of loudspeaker assemblies is oriented to provide the acoustic sound masking signal in a direct path into the predetermined area in which masking sound is needed. In addition, the sound masking system of the invention can include a remote control function by which a user can select from a plurality of stored sets of information for providing from a recipient loudspeaker assembly an acoustic sound masking signal having a-selected sound masking spectrum.

GNSS jamming signal detection

Methods and apparatus for detecting, geo-locating and/or classifying a GPS or GNSS jamming signal are disclosed. One such method comprises the steps of analysing a spectrogram of the jamming signal using a tree-based decision process and as a result, then selecting one of a number of types of jamming signal, wherein one of the decisions (1103) in the tree is whether the spectrogram has spectral periodicity.

Distributed ledger for wireless channel assignment

A digital currency driven channel assignment technique is disclosed. Each AP in a distributed network uses a channel selection manager and a distributed ledger to select channels according to a channel assignment and a digital currency associated with the distributed ledger. The digital currency incentivizes APs to make sacrifices in their channel selection for the benefit of the overall network while punishing APs that select channels selfishly and cause bandwidth interference.