Patent classifications
H04K3/65
DETECTING TIMING ANAMOLIES
Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system by detecting timing anomalies between timing signals. An embodiment operates by analyzing first timing data accessed from a validated source and second timing data accessed from an unvalidated receiver source in order to compute a threat detection value, which is utilized to determine if there is a discrepancy or anomaly in the timing or frequency of either the validated and unvalidated sources.
Communications system having multiple carriers with selectively transmitted real information and fake information and associated methods
A radio frequency (RF) communications system may include an RF transmitter having multicarrier transmitter circuitry that transmits frequency bands over a frequency range. A controller may selectively transmit real information over at least one of the frequency bands and selectively transmits fake information within the frequency range. The controller's operation is based on embedded machine learning model and real-time effectiveness feedback from built-in spectral analyzer. An RF receiver receives the real information from the RF transmitter.
CYBER-PHYSICAL SYSTEM FOR DETECTING POLE-DYNAMICS ATTACK
Disclosed is a cyber-physical system for detecting a pole-dynamics attack, including an attack detector configured to receive a sensor signal output from a physical system and to output an attack detection signal based on the received sensor signal, and a mode controller configured to receive the sensor signal and to output an input control signal for controlling the physical system based on the received sensor signal, wherein the mode controller controls a normal control (NC) mode and an attack detection control (ADC) mode for detecting pole-dynamics attack (PDA) from an output to be repeatedly executed at a preset switching period.
Electronic warfare system device with non-real-time threat signal analysis and electronic attack function
Provided are electronic warfare system device including: an electronic warfare support unit for receiving a threat signal and generating a Pulse Description Word (PDW) using the received threat signal; an electronic warfare system display for downloading the PDW to perform a threat signal analysis and selecting an electronic attack technique based on the threat signal analysis; and an electronic attack unit for outputting at least one of noise jamming and deception jamming based on the electronic attack technique selected in the electronic warfare system display to perform an electronic attack.
System and method for monitoring wireless communication channel by using cooperative jamming and spoofing
A monitoring system using cooperative jamming and spoofing according to an embodiment of the present disclosure includes a spoofing relay to amplify and relay an illegal signal detected from an illegal transmitter according to a preset amplification coefficient, a cooperative jammer to transmit a jamming signal for changing the quality of a communication channel to an illegal receiver with a preset transmit power, and a monitor to calculate the amplification coefficient and the transmit power so that an information monitoring amount is maximum based on the illegal signal received from the spoofing relay.
Acoustic metamaterial
A metamaterial comprising, a plurality of acoustic vector field sensors, each configured to sense an acoustic vector field of a fluid within a fluid-filled space in response to fluid waves, and producing an electrical signal corresponding to the sensed acoustic vector field; a processor configured to perform a time and space transform on the electrical signal; and at least one phased array transducer, configured to emit fluid waves according to a produced acoustic vector field pattern dependent on a result of the time and space transform, a within a portion of the fluid.
Methods and apparatus to validate data communicated by a vehicle
Methods, apparatus, systems and articles of manufacture are disclosed to validate data communicated by a vehicle. An example apparatus an anomaly detector to, in response to data communicated by a vehicle, at least one of compare an estimated speed with a reported speed or compare a location of the vehicle with a reported location. The apparatus including the anomaly detector further to generate an indication of the vehicle in response to the comparison. The apparatus further includes a notifier to discard data sent by the vehicle and notify surrounding vehicles of the data communicated by the vehicle.
Privacy device for smart speakers
Systems, apparatuses, and methods are described for a privacy blocking device configured to prevent receipt, by a listening device, of video and/or audio data until a trigger occurs. A blocker may be configured to prevent receipt of video and/or audio data by one or more microphones and/or one or more cameras of a listening device. The blocker may use the one or more microphones, the one or more cameras, and/or one or more second microphones and/or one or more second cameras to monitor for a trigger. The blocker may process the data. Upon detecting the trigger, the blocker may transmit data to the listening device. For example, the blocker may transmit all or a part of a spoken phrase to the listening device.
DRONE DEFENSE SYSTEM
Described herein is a system for drone defense, comprising at least one jammer and at least one radio detector, wherein the jammer is set up to send an interference signal over a frequency range, and the radio detector is set up to detect a radio control signal of a drone, the frequency range of the interference signal comprises a carrier frequency of the radio control signal or a GPS signal, wherein the jammer is configured to temporarily interrupt the interference signal and the radio detector is configured to receive the interference signal, detect the interruptions and detect the radio control signal of the drone within the interruptions of the interference signal.
Identifying, tracking, and disrupting unmanned aerial vehicles
A handheld, man-portable countermeasure device can include a directional antenna and signal disruption components in electronic communication with the directional antenna. The signal disruption components can include a signal generator coupled to an amplifier. The countermeasure device can include a computing device coupled to an electronic communications transceiver. The computing device can provide, via the electronic communications transceiver, at least one bilateral communication link to operatively connect with a UAV tracking system. The computing device can determine status information associated with the electronic circuitry of the countermeasure device. The computing device can transmit, via the bilateral communication link, the status information to the UAV tracking system.