H04K3/43

Systems and methods for disrupting unauthorized communications in low frequency radio communication devices

Systems and methods for disrupting unauthorized communication in low frequency radio communication devices are provided. Traditional systems and methods may fail to provide for disrupting unauthorized communications by generating low frequency signals in the same band as the low frequency bands of the low frequency radio communication devices. Embodiments of the present disclosure provides for overcoming the limitations faced by the traditional systems and methods by generating, via a square wave generator and a device coil of a low frequency radio communication device, low frequency signals; integrating the low frequency signals on a computing device by implementing a power controlling technique; and disrupting, via the integrated low frequency signals on the computing device, unauthorized communications in the low frequency radio communication device.

Vehicle access with selective jamming radio signal

A jamming radio signal is selectively outputted based on an access signal. The jamming radio signal is configured to prevent an interrogation signal of a vehicle to complete an authentication of a vehicle key of the vehicle.

SYSTEMS AND METHODS FOR READING RFID TAGS

An RFID system comprises an array of antennas each configured to emit a plurality of beams in different directions. The beams of each pair of adjacent antennas are directed towards one another and overlap. A pair of adjacent antennas transmits simultaneously and the overlapping beams interfere to create an interference pattern. An RFID reader controls the relative phase and/or frequency of the beams to move the interference pattern to read an RFID tag within the moving pattern. As the chance of a RFID tag responding to an emitted beam generally increases with signal strength of the reader beam an area of constructive interference means that RFID tags in that region are more likely to respond to the signal. The system can cover a large proportion of the area below ceiling-mounted antennas, where cover generally means that RFID tags in that area will be successfully read.

Directional High-Energy Radio Frequency Weapon
20220082358 · 2022-03-17 ·

Systems, methods and apparatus are described for a HERF weapon that may emit high-energy radio waves at a target based on locational information and a frequency associated with the target. The HERF weapon may receive the frequency and locational information from a sensing system. The HERF weapon may emit a high energy pulse toward the target and on the frequency associated with the target to disable or destroy the target without affecting nearby devices. The HERF weapon may allow the user to avoid detection by using a frequency that corresponds to the target's operating frequency.

COMMUNICATION CONTROL DEVICE AND COMMUNICATION CONTROL SYSTEM

According to an embodiment, a communication control device includes a communication unit and a jamming control unit. The communication unit wirelessly communicates with a first device and uploads information acquired from the first device to a second device via a network. The jamming control unit allows jamming radio waves to be output to interfere with wireless communication between the first device and a device other than the communication control device, the device being to perform wireless communication in a communication band used by the first device.

Signal processing apparatus and method, and program
11081128 · 2021-08-03 · ·

A sound state estimating unit detects surrounding sound at a timing at which a notification to a destination user occurs. A user state estimating unit detects a position of the destination user and positions of users other than the destination user at the timing at which the notification occurs. An output control unit controls output of the notification to the destination user at a timing at which it is determined that the surrounding sound detected by the sound state estimating unit is masking possible sound which can be used for masking in a case where the position of the destination user detected by the user state estimating unit is within a predetermined area.

System and method for thermal management of shadowed devices

A data processing device includes a persistent storage for storing a state repository and a state manager. The state manager updates a portion of the state repository associated with a row of devices based on states of the devices to obtain an updated state repository; makes a first determination that the portion indicates a thermal issue; in response to the first determination: makes a second determination that the thermal issue cannot be addressed using a gas flow; and in response to the second determination: modifies a power state of at least one of the devices in the row to address the thermal issue.

Active antenna steering for network security
11038270 · 2021-06-15 · ·

The disclosure concerns wireless communication systems, including, antenna systems and related methods, which are each directed to utilizing one or more multi-mode antennas for the purpose of varying a radiation pattern characteristic thereof to enhance network security and communication link between an access point and one or more client devices on a network.

UAS DETECTION AND NEGATION
20210197967 · 2021-07-01 ·

Unauthorized operation of a UAV may present privacy or security risks. A software-defined radio (SDR) or other receiver can be used to monitor a specified range of frequencies to provide detection of wireless communication signals suspected of relating to UAV operation. A protocol detector corresponding to a trained classifier can be applied to data packets demodulated by the SDR. A transmitter can then be triggered to provide warnings by injecting warning data into a video channel in response to the detected protocol. Control of the UAV can be established by transmitting simulated control commands that overwhelm the signals received from the UAVs normal remote control. If transmission of warnings or simulated control signals fail to suppress unwanted UAV operation, other actions can be triggered such as jamming or dispatch of an interceptor such as a surveillance UAV.

Device agnostic audio path sealing

In accordance with some embodiments, an apparatus that seals the audio path of an enclosed device is provided. The apparatus includes a first housing portion and a second housing portion, when mated, are arranged to enclose a device, where a surface of the second housing portion is arranged to impart pressure on the device toward the first housing portion. The apparatus further includes a first supporting portion disposed along one side of the first housing portion and arranged to support the device. The apparatus also includes a first liner disposed in the first housing portion and arranged to form a first cavity, where the first cavity is adjacent to the first supporting portion. The apparatus further includes a noise generator operable to provide noise signal stream and a first audio output device coupled to the noise generator operable to output first masking signals to the first cavity.