Patent classifications
H04K3/43
Directional high-energy radio frequency weapon
Systems, methods and apparatus are described for a HERF weapon that may emit high-energy radio waves at a target based on locational information and a frequency associated with the target. The HERF weapon may receive the frequency and locational information from a sensing system. The HERF weapon may emit a high energy pulse toward the target and on the frequency associated with the target to disable or destroy the target without affecting nearby devices. The HERF weapon may allow the user to avoid detection by using a frequency that corresponds to the target's operating frequency.
Apparatuses, Methods, and Software for Secure Short-Range Wireless Communication
Apparatuses that provide for secure wireless communications between wireless devices under cover of one or more jamming signals. Each such apparatus includes at least one data antenna and at least one jamming antenna. During secure-communications operations, the apparatus transmits a data signal containing desired data via the at least one data antenna while also at least partially simultaneously transmitting a jamming signal via the at least one jamming antenna. When a target antenna of a target device is in close proximity to the data antenna and is closer to the data antenna than to the jamming antenna, the target device can successfully receive the desired data contained in the data signal because the data signal is sufficiently stronger than the jamming signal within a finite secure-communications envelope due to the Inverse Square Law of signal propagation. Various related methods and machine-executable instructions are also disclosed.
Microphone Jammer
A microphone jammer includes an ultrasonic transducer for emitting an ultrasonic jamming signal to jam a microphone of an external electronic device. The apparatus includes a sound chamber that is shaped to direct the ultrasonic jamming signal towards an area for placement of an external electronic device that includes the microphone. The apparatus may include a base and a top portion connected to the base, with the ultrasonic transducer being in the top portion and the sound chamber being shaped to direct the ultrasonic jamming signal towards the base.
System and method for intercepting unmanned aerial vehicles
The invention provides a system and method for intercepting a target UAV by releasing a plurality of countermeasure (CM) objects in a projected path thereof to form a 3D countermeasure cloud. Pieces of flexible materials configured to become ensnared in the propellers of the target UAV or otherwise interfere with their ability to provide lift and thrust capabilities to the UAV. A UAV interception control system may track the target UAV and compute a location probability volume therefor using a modified Kalman filter to decide on a projected interception location and time.
Method for anti-drone using GPS spoofing signal and system therefore
Disclosed are an anti-drone method using a GPS spoofing signal and a system thereof. According to an embodiment of the inventive concept, an anti-drone method may include injecting a GPS spoofing signal to analyze a drone feature of a target drone and hijacking the target drone by injecting a GPS spoofing signal into the target drone based on a drone hijacking strategy corresponding to the analyzed drone feature among predefined drone hijacking strategies. The analyzing of the drone feature may include injecting the GPS spoofing signal to analyze a safety device mechanism (GPS fail-safe) and a path-following algorithm of the target drone.
Security-enhanced deep learning fingerprint-based indoor localization
An exemplary radio fingerprint-based indoor localization method and system is disclosed that is resistant to spoofing or jamming attacks (e.g., at nearby radios, e.g., access points), among other types of interference. The exemplary method and system may be applied in the configuring of a secured convolutional neural network (S-CNNLOC) or secured deep neural network configured for attack-resistant fingerprint-based indoor localization.
Sound Masking System
A sound masking system according to the invention is disclosed in which one or more sound masking loudspeaker assemblies are coupled to one or more electronic sound masking signal generators. The loudspeaker assemblies in the system of the invention have a low directivity index and preferably emit an acoustic sound masking signal that has a sound masking spectrum specifically designed to provide superior sound masking in an open plan office. Each of the plurality of loudspeaker assemblies is oriented to provide the acoustic sound masking signal in a direct path into the predetermined area in which masking sound is needed. In addition, the sound masking system of the invention can include a remote control function by which a user can select from a plurality of stored sets of information for providing from a recipient loudspeaker assembly an acoustic sound masking signal having a-selected sound masking spectrum.
Algorithm and techniques for high-resolution interference parameter estimation in low-swap environment
Techniques for providing a multi-stage iterative scheme to determine fine granularity estimates of parameters of an interfering signal and for using the fine granularity estimates of the parameters to reduce an impact of the interfering signal against a signal of interest (SOI) are disclosed. An input signal is identified. A first set of estimation parameters that provide a coarse granularity estimate of a center frequency of the jamming signal and of a symbol rate of the jamming signal are determined. The first set of estimation parameters are refined to generate a medium granularity estimate of the center frequency and the symbol rate of the jamming frequency. The medium granularity estimates are also refined to produce a fine granularity estimate of the center frequency and the symbol rate. The fine granularity estimates are used to remove or reduce an influence of the jamming signal on the input signal.
A HARDWARE COMPONENT AND A METHOD FOR IMPLEMENTING A CAMOUFLAGE OF CURRENT TRACES GENERATED BY A DIGITAL SYSTEM
Implementing a camouflage of current traces generated by a hardware component having one or more set of digital elements defining a plurality of operational datapaths comprises adjusting (761) one or more working condition(s) of the hardware component, measuring (762) a reaction of the hardware component to the working condition(s) by a logic test circuit through processing data operations along a reference datapath having a minimum duration corresponding to at least the longest of the operational datapaths, and in response to detecting an error (763) along the reference datapath, modifying (764) the working condition(s) so that the error generated by the logic test circuit is cancelled. Applications to countermeasures to side-channel attacks.
GAME TABLE READING SYSTEM
The game table reading system comprises reading antennas for each of a plurality of reading areas of a game table, read-restriction antennas for each of the plurality of the reading areas, the read-restriction antennas restricting the RFID tag embedded in a game token placed in the corresponding reading area from being read by the reading antenna corresponding to the other adjacent reading areas, a reading control device that controls the reading antennas, and a read-restriction control device that controls the read-restriction antennas. The read-restriction control device causes the read-restriction antennas corresponding to the reading areas adjacent to the reading areas corresponding to the reading antenna that the reading control device causes to read, in synchronization with the reading control device.