H04K3/46

HYBRID RADAR JAMMING AND COMMUNICATION APPARATUS

A hybrid electronic warfare and communications system (EW/COMM) eliminates the space, power, weight, and cost of a dedicated communication system by exchanging messages with other nodes in a network as phase modulations of radar jamming signals. Some embodiments impose message phase modulations onto CW jamming signals, while other embodiments interleave message phase modulations with pseudorandom phase modulations of the jamming signals. Message chip rates can be matched to pseudorandom phase modulation chip rates. Messages are thereby obfuscated as either phase noise or random phase modulation of the jamming signals. Messages can be encoded as BPSK or QPSK modulations. Messages can be preceded by pre-established headers known to other nodes, and distinguished thereby from random noise modulations. Some embodiments include a dedicated COMMS module and/or antenna, while other embodiments implement the communications function mostly or entirely in software. Messages can be encrypted before transmission and decrypted after reception.

Detection And Protection Against Jam Intercept And Replay Attacks
20180089918 · 2018-03-29 ·

Method and apparatus are disclosed for detection and protection against jam intercept and replay attacks. An example disclosed key fob includes a first wireless transceiver tuned to communicate via a first frequency band, second wireless transceiver tuned to communicate via a second frequency band, and a communicator. The first frequency band is different than the second frequency band. The example communicator sends a first message via the first wireless transceiver in response to activation of a first button. Additionally, the example communicator, in response to not receiving a second message via the second wireless transceiver, provides an alert.

Method for Jointly Adapting an OFDM Waveform and the Demodulator for Interference Mitigation and Harsh Channels

The present invention provides a method and system for a processing multicarrier signal to create a spectral correlation across multiple antennas. The system includes at least one transmitter adapted to create a plurality of symbols, each symbol representing one or more bits from a plurality of bitstreams. The transmitter creates a plurality of repetition patterns, each pattern containing a copy of the symbols and each repetition pattern comprising a combination of symbols that varies in time, frequency and space. The repetition patterns are transmitted over and received by one or more separate antennas where a receiver demodulates the repetition patterns and linearly combines each repeated symbols across time, frequency and space to estimate said transmitted symbol.

Using external sounds to alert vehicle occupants of external events and mask in-car conversations

An audio processing system may selectively identify certain environmental sounds and playing back these sounds, or a representation of these sounds, in the vehicle's cabin. The audio processing system may filter the environmental sounds to identify a particular sound that matches an event such as a bouncing ball, squealing tires, footsteps, and the like. The audio processing system may then provide an audio alert to an occupant in the vehicle. For example, the system may process the identified sound (e.g., amplify and/or isolate the sound) and use a speaker to output the processed sound into the interior of the vehicle. In another embodiment, the audio processing system may use environmental sounds as an audio masking sound for creating privacy zones within the vehicle. The audio processing system may filter the environmental sounds to identify a continuous sound which is then output to generate the privacy zones.

Privacy Device For Smart Speakers
20240406648 · 2024-12-05 ·

Systems, apparatuses, and methods are described for a privacy blocking device configured to prevent receipt, by a listening device, of video and/or audio data until a trigger occurs. A blocker may be configured to prevent receipt of video and/or audio data by one or more microphones and/or one or more cameras of a listening device. The blocker may use the one or more microphones, the one or more cameras, and/or one or more second microphones and/or one or more second cameras to monitor for a trigger. The blocker may process the data. Upon detecting the trigger, the blocker may transmit data to the listening device. For example, the blocker may transmit all or a part of a spoken phrase to the listening device.

INHIBITING UNAUTHORISED CONTACTLESS READING OF CONTACTLESS READABLE OBJECT
20170147842 · 2017-05-25 ·

A jamming device for inhibiting unauthorised contactless reading of a contactless readable object is disclosed. In one embodiment, the jamming device includes: an antenna for receiving an interrogation signal from a reader device; a touch sensitive interface; and a circuit electrically connected to the antenna and the touch sensitive interface, wherein the circuit is configured to: operate in a first mode to generate and emit a jamming signal, via the antenna, in response to receiving the interrogation signal whilst the touch sensitive interface fails to indicate a touch event; and operate in a second mode whilst the touch sensitive interface indicates a touch event, wherein the jamming signal is not emitted via the antenna in response to receiving the interrogation signal whilst operating in the second mode. A card carrying object, system and method is also disclosed.

METHOD AND SYSTEM OF REACTIVE INTERFERER DETECTION
20170139034 · 2017-05-18 ·

A method and system of reliably detecting a reactive jamming attack and estimating the jammer's listening interval for exploitation by a communication system comprises channelizing one or more signals of interest (SOI), channelizing one or more signals of unknown origin (SUO), identifying frequency support patterns for the SOI and SUO using Bayes thresholds, comparing SOI and SUO detection map histories, and determining a percent match, where a match percentage above a specified minimum indicates a reactive attack. Edge detection can be used to enhance jammer support. Embodiments further detect reactive jammer adaptation to changes in the SOI's frequency support. Embodiments include detectors that are insensitive to jammer modulation and/or signal type. A jammer reaction delay and/or size and periodicity of receive window can be detected. Embodiments determine if a jammer is copying and retransmitting the SOI's waveform(s), and/or if the jammer is anticipatory.

Inhibiting unauthorised contactless reading of a contactless readable object

A jamming device for inhibiting unauthorized contactless reading of a contactless readable object is disclosed. In one embodiment, the jamming device includes: an antenna for receiving an interrogation signal from a reader device; a touch sensitive interface; and a circuit electrically connected to the antenna and the touch sensitive interface, wherein the circuit is configured to: operate in a first mode to generate and emit a jamming signal, via the antenna, in response to receiving the interrogation signal while the touch sensitive interface fails to indicate a touch event; and operate in a second mode while the touch sensitive interface indicates a touch event, wherein the jamming signal is not emitted via the antenna in response to receiving the interrogation signal while operating in the second mode. A card carrying object, system and method is also disclosed.

Biometrics-Based Dynamic Sound Masking
20170061950 · 2017-03-02 · ·

Apparatus having corresponding methods and computer-readable media comprises: a speaker configured to provide a masking sound to an individual; a biometric sensor configured to collect biometric data from the individual; and a controller configured to modify the masking sound based on the biometric data.

Apparatus and method for generating jamming signal, communication system

This application relates to an apparatus and method for generating a jamming signal, and a communication system. In one aspect, the method may include converting binary bits of a first communication signal to be transmitted and obtaining at least one codeword matched previously to the binary bits. The method may also include generating a second communication signal by superimposing a first conversion signal being obtained by converting the first communication signal to an up-chirp signal and a second conversion signal being obtained by converting the first communication signal to a down-chirp signal. The method further include generating a pseudo jamming signal by computing the second communication signal and the codeword.