H04K3/65

METHOD AND DEVICE FOR DETECTING A DECOY OPERATION OF A GNSS SYSTEM
20220244400 · 2022-08-04 ·

A method of detecting an operation to spoof a first positioning device carried by a first vehicle moving in a zone in which at least one second vehicle carrying a second positioning device is also moving, the method comprising the step of causing at least one first positioning value to be calculated for each vehicle from initial satellite signals received by each device; the method being characterized in that it further comprises the steps of: causing the second device to initiate a latching stage in order to make a new search for satellite signals and using the new satellite signals received by the second device to calculate a second positioning value for the second vehicle at the same instant as the first value; comparing the first and second values relating to the second vehicle; and issuing a warning when the two values do not coincide.

Global Positioning System Spoofing Countermeasures

Concepts and technologies directed to global positioning system spoofing countermeasures are disclosed. Embodiments can include a system that comprises a processor and a memory that stores computer-executable instructions that configure a processor to perform operations that include identifying a mobile transportation equipment that includes an electronic logging device and a low-power wide area device, where the electronic logging device obtains GPS location data from a GPS receiver unit and the low-power wide area device obtains independent location data via a narrow band path of a low-power wide area network. The operations can include determining that a spatio-temporal misalignment exists between the independent location data and the GPS location data for the mobile transportation equipment, and providing spatio-temporal data alignment. The operations can include determining that a GPS spoofing attack has occurred, and creating a GPS spoofing alert for the mobile transportation equipment.

Privacy device for smart speakers
11388516 · 2022-07-12 ·

Systems, apparatuses, and methods are described for a privacy blocking device configured to prevent receipt, by a listening device, of video and/or audio data until a trigger occurs. A blocker may be configured to prevent receipt of video and/or audio data by one or more microphones and/or one or more cameras of a listening device. The blocker may use the one or more microphones, the one or more cameras, and/or one or more second microphones and/or one or more second cameras to monitor for a trigger. The blocker may process the data. Upon detecting the trigger, the blocker may transmit data to the listening device. For example, the blocker may transmit all or a part of a spoken phrase to the listening device.

PROTECTING TRANSMISSIONS AGAINST JAMMING

This document discloses a solution for performing anti-jamming procedures. According to an aspect, a method for a terminal device comprises: receiving a first reference signal allocation from an access node, wherein the first reference signal is unique to the terminal device in a cell managed by the access node; receiving a second reference signal allocation from the access node, wherein the second reference signal is shared with at least one other terminal device in the cell; causing transmission of payload data together with the first reference signal according to a regular transmission pattern; and breaking the regular transmission pattern by transmitting dummy data together with the second reference signal in a time-frequency resource shared with the at least one other terminal device.

COMPACT RECEIVER SYSTEM WITH ANTIJAM AND ANTISPOOF CAPABILITY
20220247510 · 2022-08-04 ·

A signal-of-interest is received by using a first and second planar electrically conductive disc to define an antenna. The antenna produces RF signal outputs at three output ports E.sub.x, E.sub.y and E.sub.z, each having a different associated gain pattern and polarization response. At least one null is automatically asserted in a pattern defined by the antenna in a specified direction by selectively weighting a gain and a phase of the RF signals respectively produced from the three output ports and then combining the RF signals to produce a first receiver signal output.

Global positioning system spoofing countermeasures

Concepts and technologies directed to global positioning system spoofing countermeasures are disclosed. Embodiments can include a system that comprises a processor and a memory that stores computer-executable instructions that configure a processor to perform operations that include identifying a mobile transportation equipment that includes an electronic logging device and a low-power wide area device, where the electronic logging device obtains GPS location data from a GPS receiver unit and the low-power wide area device obtains independent location data via a narrow band path of a low-power wide area network. The operations can include determining that a spatio-temporal misalignment exists between the independent location data and the GPS location data for the mobile transportation equipment, and providing spatio-temporal data alignment. The operations can include determining that a GPS spoofing attack has occurred, and creating a GPS spoofing alert for the mobile transportation equipment.

Systems and methods for covert communications

A communications system and methods for covert communications are provided. A first transmitter that transmits an information carrying signal to a target receiver, a second transmitter and a third transmitter transmit jamming signals to the target receiver, such that the information carrying signals and the jamming signals are interleaved when received by the target receiver The information carrying signals and the jamming signals can be at least partially overlapping by an eavesdropper.

METHOD FOR SECURING A COMMUNICATION USER EQUIPMENT FROM A JAMMING ATTACK
20220069936 · 2022-03-03 · ·

A method for a user equipment operating in a cellular network having a plurality of base stations, the user equipment operating on at least one of the base stations, hereinafter the serving base station, for the case of a communication loss to its serving base station, whereby the conditions relating to the serving base station or the corresponding frequency fulfills the criteria concerning jamming. The method includes the steps of: scanning for accessible base stations of the cellular network, examining the at least one base station being identified through the scanning step, by means of signalling message, evaluating the response behavior of the at least one base station, wherein in consideration of the response behavior of at least one of said base station if said base station is rated as suspicious: indicating a jamming situation, otherwise camping on at least one of the base stations.

Privacy Device For Mobile Devices
20220078556 · 2022-03-10 ·

Systems, apparatuses, and methods are described for a privacy blocking device configured to prevent receipt, by a listening device, of video and/or audio data until a trigger occurs. A blocker may be configured to prevent receipt of video and/or audio data by one or more microphones and/or one or more cameras of a listening device. The blocker may use the one or more microphones, the one or more cameras, and/or one or more second microphones and/or one or more second cameras to monitor for a trigger. The blocker may process the data. Upon detecting the trigger, the blocker may transmit data to the listening device. For example, the blocker may transmit all or a part of a spoken phrase to the listening device.

SYSTEMS AND METHODS FOR COVERT COMMUNICATIONS
20220077952 · 2022-03-10 · ·

A communications system and methods for covert communications are provided. A first transmitter that transmits an information carrying signal to a target receiver, a second transmitter and a third transmitter transmit jamming signals to the target receiver, such that the information carrying signals and the jamming signals are interleaved when received by the target receiver The information carrying signals and the jamming signals can be at least partially overlapping by an eavesdropper.