H04K3/43

SYSTEM AND METHOD FOR INTERCEPTING UNMANNED AERIAL VEHICLES
20190360783 · 2019-11-28 ·

The invention provides a system and method for intercepting a target UAV by releasing a plurality of countermeasure (CM) objects in a projected path thereof to form a 3D countermeasure cloud. Pieces of flexible materials configured to become ensnared in the propellers of the target UAV or otherwise interfere with their ability to provide lift and thrust capabilities to the UAV. A UAV interception control system may track the target UAV and compute a location probability volume therefor using a modified Kalman filter to decide on a projected interception location and time.

SYSTEM AND METHOD FOR COMMUNICATING WITH A UAV
20190363821 · 2019-11-28 ·

A method and system for communicating with an unmanned aerial vehicle (UAV) over a cellular network. The UAV need not be the same type or model and may have different communications protocols. A coded message transmitted over the cellular network is received at the UAV, decoded and retransmitted to the UAV using its native communications protocol.

Wireless device and wireless local area network signal receiving method
10491254 · 2019-11-26 · ·

A wireless device and a wireless local area network (WLAN) signal receiving method, where the wireless device includes a receiver, a jamming circuit, an interference cancelling circuit, a first antenna, and a second antenna. The receiver is coupled to the first antenna and configured to detect a WLAN signal, the jamming circuit is coupled to the second antenna, an input end of the interference cancelling circuit is coupled to the second antenna, and an output end of the interference cancelling circuit is coupled to the first antenna. The jamming circuit is configured to send, using the second antenna, an interference signal on a channel on which the WLAN signal is located, and the interference cancelling circuit is configured to generate, based on the interference signal, a reconstruction signal cancelling the interference signal received by the first antenna, and provide the reconstruction signal at the output end.

Masking open space noise using sound and corresponding visual

Methods and apparatuses for addressing open space noise are disclosed. In one example, a method for masking open space noise includes outputting from a speaker a speaker sound corresponding to a flow of water, and displaying a water element system, the water element system generating a sound of flowing water.

Active antenna steering for network security
10476155 · 2019-11-12 · ·

The disclosure concerns wireless communication systems, including antenna systems and related methods, which are each directed to utilizing one or more multi-mode antennas for the purpose of varying a radiation pattern characteristic thereof to enhance network security and communication link between an access point and one or more client devices on a network.

CARD READER DEVICE

A card reader device A1 includes: a housing 11; an openable shutter 311 that allows or disallows passing of a magnetic card C into the housing 11; a magnetic head 511 that reads magnetic data of the magnetic card C received in the housing 11; an interfering magnetic field generator 711 provided on a rear surface side of the shutter 311 to generate an interfering magnetic field in at least a region R between the magnetic head 511 and the shutter 311; an interfering magnetic field control unit 61 that controls generation of the interfering magnetic field; and an interfering magnetic field alleviating unit 81 that alleviates an influence of the interfering magnetic field on the magnetic head 511 so that the interfering magnetic field generated by the interfering magnetic field generator 711 does not interfere the reading of the magnetic data by the magnetic head 511.

Noise level measurement with mobile devices, location services, and environmental response
10446168 · 2019-10-15 · ·

Methods and apparatuses for noise management are disclosed. In one example, a method includes receiving a plurality of noise level measurements taken at a plurality of headsets. The method includes receiving a plurality of location data, including receiving a location data associated with each headset in the plurality of headsets. In one example, the method further includes adjusting an environmental parameter utilizing the noise level measurements. In one example, the method further includes providing location services to a user directing the user to a geographical area having a lower noise level.

Shielded airfreight container
10442613 · 2019-10-15 · ·

A container has a base, sides and a top, the base, sides and top together defining a void within which items can be located in use, an electromagnetic shield fully surrounding at least part of the void to provide an electromagnetic shield between an exterior of the container and items located within the said part of the void, an antenna located within the said part of the void and a signal generator connected to the antenna and operable to apply a signal to the antenna to cause the transmission of an impeding signal within the said part of the void to impede the reception of signals transmitted from locations external to the container by items located within the said part of the void.

Systems and methods for securing wireless communications

Systems and methods of friendly jamming for securing wireless communications at the physical layer are presented. Under the assumption of exact knowledge of the eavesdropping channel, a resource-efficient distributed approach is used to improve the secrecy sum-rate of a multi-link network with one or more eavesdroppers while satisfying an information-rate constraint for all links. A method based on mixed strategic games can offer robust solutions to the distributed secrecy sum-rate maximization. In addition, a block fading broadcast channel with a multi-antenna transmitter, sending two or more independent confidential data streams to two or more respective users in the presence of a passive eavesdropper is considered. Lastly, a per-link strategy is considered and an optimization problem is formulated, which aims at jointly optimizing the power allocation and placement of the friendly jamming devices for a given link under secrecy constraints.

MAGNETIC JAMMER AND CARD READER
20190305872 · 2019-10-03 ·

A magnetic jammer for a card reader and structured to generate a magnetic field for jamming illegal reading of magnetic data stored on a card may include a core comprising magnetic material; and a coil wound around the core and structured to generate a jamming magnetic field. The core may include a plurality of separable core segments integrated into a single unit.