Patent classifications
H04K3/45
CONTROL METHOD, APPARATUS AND DEVICE FOR PREVENTING PSEUDO GNSS SIGNAL INTERFERENCE, AND STORAGE MEDIUM
A control method, a control apparatus and a device for preventing pseudo GNSS signal interference, and a storage medium are provided. The method includes: in response to detecting that a received GNSS signal includes a pseudo GNSS signal, restraining a time service system of a communication device from tracking the received GNSS signal; and removing the restraining on the time service system in response to detecting that the pseudo GNSS signal disappears.
Method and system for producing a jammer signal
A distributed antenna system with a plurality of remote radio units is disclosed. The distributed antenna system includes a jammer signal generator for generating a jammer signal in at least one frequency range to be blocked on detection of an uplink signal in a coverage area, as well as at least one antenna element for transmitting the generated jammer signal in the coverage area. The jammer signal will ensure that any mobile devices or stations within the coverage area are unable to transmit radio signals as the frequency range(s) on which the radio signals should be transmitted are blocked by the jammer signal.
NFC tags with proximity detection
Systems, apparatuses and methods provide for detecting the proximate placement of an external NFC reader to a specific location on a display surface. The display surface can be intended for viewing indicia and enabling interaction with an NFC communication device embedded within the display. A circuit can control an NFC security system that can scan for unauthorized tags affixed to the surface of a display. The NFC security system may be activated by an NFC enabled mobile phone placed proximate to the indicated region for receiving an NFC coded message from the display. An NFC security scan can be performed prior to the mobile phone reading the message from the intended NFC tag in the display. Enabling interactive display modes can allow for making selections indicated on the display or detecting motion gestures across the face of the display.
METHOD AND SYSTEM FOR DETECTING, MONITORING, AND CONTROLLING A MOBILE COMMUNICATION DEVICE
Disclosed herein is a method and system for detecting, monitoring and/or controlling one or more of mobile services for a mobile communication device (also referred to herein as a Controllable Mobile Device or CMD), and in particular, when the device is being used and the vehicle, operated by the user of the device, is moving. In addition, one aspect of the invention generally relates to a method and system for modifying a user's driving behaviors, in particular to a system and method for modifying a user's unsafe driving behaviors, e.g., using one or more services of a controllable mobile device while driving.
NON-COMMUNICATION ELECTRONIC WARFARE SYSTEM DESIGN ANALYSIS SYSTEM BASED ON ENGINEERING MODELING AND CONTROL METHOD THEREOF
This application relates to a non-communication electronic warfare system design analysis system based on engineering modeling. In one aspect, the system includes a scenario unit transmitting a simulation threat signal corresponding to an input scenario and a threat signal simulator transmitting an actual threat signal. The system may also include an electronic warfare support receiving model unit allocating a jamming technique. The system may further include an electronic warfare support receiving analyzer allocating the jamming technique to the received actual threat signal and an electronic attack jamming model unit modelling a device for generating a simulation jamming signal. The system may further include an electronic attack jamming generator generating an actual jamming signal and a simulation situation demonstration controller analyzing performance by using the actual jamming signal and the actual threat signal.
ENSURING TRANSMISSIONS ARE COMPLETED IN A WIRELESS NETWORK
A method comprising determining that interference may occur in a wireless network an apparatus is connected to, obtaining a first link that is of a first type, obtaining a second link that is of a second type, determining data to be transmitted from the apparatus to another apparatus connected to the wireless network, determining that a transmission occurs in the first link and transmitting the data in the second link, wherein the transmission in the first link has a longer duration than transmitting the data in the second link and the transmission in the first link and transmitting the data in the second link overlap in time.
Low-altitude unmanned aerial vehicle surveillance system
Disclosed is a low-altitude unmanned aerial vehicle surveillance system. According to an embodiment, monitoring is performed using a balloon main body filled with gas and staying in the air; radar; camera units being provided outside the balloon main body, and including a camera taking an image of a subject; radio frequency detectors; and sound detectors and correspondingly, interceptor means is included. As interceptor means, a jammer, a jamming gun, and a spoofing device corresponding to jamming are disclosed.
ANTI-DRONE INTEGRATED MANAGEMENT DEVICE AND OPERATION METHOD THEREOF
An anti-drone integrated management device includes a drone detection unit that detects at least one drone invading a restricted area, a drone ID identification unit that requests drone unique information to the at least one detected drone, and receives drone unique information from the at least one detected drone, a drone ID identification information storage/management unit that stores and updates the drone unique information received by the drone ID identification unit, an anti-drone integrated controller that determines whether to neutralize the at least one detected drone based on the drone unique information stored in the drone ID identification information storage/management unit, and a drone neutralization unit that neutralizes the at least one detected drone under control of the anti-drone integrated controller.
Airspace tolling
A system for airspace tolling determines a presence of an aerial vehicle in a monitored airspace and determines a unique identity of the aerial vehicle. The system then determines an operator of the aerial vehicle and accesses an account associated with the operator. The system applies a charge to the account of the operator in response to the detection and identification of the aerial vehicle in the monitored airspace.
Protection of personal data contained on an RFID-enabled device
A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.