Patent classifications
H04K3/42
ACOUSTIC PATTERN DETERMINATION
According to an example, a method comprises receiving a first audio stream from an input device, detecting presence within the first audio stream of at least an acoustic pattern, executing at least one corrective action over a portion of data of the first audio stream including the acoustic pattern such that a second audio stream is obtained, and transmitting the second audio stream to an output device.
METHOD FOR PREVENTING A VOICE FROM BEING INTERCEPTED
The invention present disclosure relates to a method for preventing the voice of at least one person in a vehicle from being intercepted. At least one loudspeaker in the vehicle is activated, wherein the at least one loudspeaker is used to generate audio signals which have at least one frequency that is higher than the threshold frequency for sound that is audible to the at least one person, and the audio signals are used to interfere with the reception of a signal by means of at least one microphone when the at least one person uses their voice to articulate.
Apparatuses, methods, and software for secure short-range wireless communication
Apparatuses that provide for secure wireless communications between wireless devices under cover of one or more jamming signals. Each such apparatus includes at least one data antenna and at least one jamming antenna. During secure-communications operations, the apparatus transmits a data signal containing desired data via the at least one data antenna while also at least partially simultaneously transmitting a jamming signal via the at least one jamming antenna. When a target antenna of a target device is in close proximity to the data antenna and is closer to the data antenna than to the jamming antenna, the target device can successfully receive the desired data contained in the data signal because the data signal is sufficiently stronger than the jamming signal within a finite secure-communications envelope due to the Inverse Square Law of signal propagation. Various related methods and machine-executable instructions are also disclosed.
Down conversion system and method
A system and method of down converting microwave (RF) signals into lower frequencies are disclosed, such that associated electronics can more precisely analyse the signals. Exemplary embodiment, can be applied to multiple RF bands by using several optical wavelengths.
Method and apparatus for generating noise signal
This application relates to a noise signal generating apparatus. In one aspect, the apparatus includes a bandwidth expansion unit configured to generate a noise signal having a second bandwidth by expanding a noise source signal having a first bandwidth to the second bandwidth that is greater than the first bandwidth. The apparatus may also include a randomization unit configured to perform randomization and output the generated noise signal having the second bandwidth.
Deterrent for unmanned aerial systems
A system for providing integrated detection and deterrence against an unmanned vehicle including but not limited to aerial technology unmanned systems using a detection element, a tracking element, an identification element and an interdiction or deterrent element. Elements contain sensors that observe real time quantifiable data regarding the object of interest to create an assessment of risk or threat to a protected area of interest. This assessment may be based e.g., on data mining of internal and external data sources. The deterrent element selects from a variable menu of possible deterrent actions. Though designed for autonomous action, a Human in the Loop may override the automated system solutions.
Barrage Jammer with Contoured Amplitude
The present invention is a barrage jammer with contoured amplitude and an associated method for barrage jamming with contoured amplitude.
In a standard prior art barrage jammer, the amplitude of the RF signal is independent from the ambient spectral environment.
Alternatively, in a barrage jammer according to the current invention, the ambient spectral environment is detected, processed, and a contoured amplitude plan is developed based on the ambient environmental spectrum data. The barrage jammer transmit signal is transmitted in accordance with the contour amplitude plan.
The invention is particularly useful when deployed in a Managed Access Service (MAS) system or as a jamming system. In particular, such a system can be used in a facility (such as a prison, school, government building, etc) to prevent cellphone usage.
Flight interference apparatus
A flight interference apparatus enabling it to block intrusion by a miniature unmanned aerial vehicle which is remotely piloted by radio communication into an area to be protected, suppress influence on communication within and outside the area, and reduce the number of required antenna devices. The flight interference apparatus includes one or a plurality of antenna devices which radiate a jamming signal from a directional antenna, and the directional antenna includes a radiating element which radiates a jamming signal of a predetermined frequency band and a reflector which gives directionality to the jamming signal in its radiation direction.
METHOD AND APPARATUS FOR REPELLING A DETECTABLE DRONE
Some embodiments relate to a method for repelling a detectable drone, whose flight control and/or whose drone flight path can be influenced by repulsion measures, wherein a repulsion space is defined as a part of the airspace, and wherein the flight control and/or the drone flight path of a drone located in the repulsion space is influenced.
Energy-Efficient Reactive Jamming of Frequency-Hopping Spread Spectrum (FHSS) Signals using Software-Defined Radios
A reactive jamming software defined radio (SDR) apparatus to target Frequency Hopping Spread-Spectrum (FHSS) signals includes a peripheral module for SDR processing; a reactive jamming hardware IP core that implements time-sensitive operations on a field programmable gate array (FGPA); and a host computer that implements non-time-critical operations, such as jammer configuration, logging, and strategy composition.