H04K3/86

System and Method for Securing Intelligent Automated Assistant Devices
20190074002 · 2019-03-07 · ·

Embodiments disclosed herein include security systems and methods for securing an intelligent automated assistant device comprising. In some embodiments, the security system may include an intelligent automated assistant device including a microphone and a camera. Additionally, the security device may be placed near the intelligent automated assistant device. The security device may also include security components to distort sounds from a sound source to be detected by the microphone. As a result, this may prevent third parties from at least remotely streaming or recording live audio from a microphone on the intelligent automated assistant device.

UTILIZATION OF LOCATION INFORMATION FOR IMPROVING TRUST MODEL FOR REAL TIME TRAFFIC AND TUNER FUNCTIONS
20190058536 · 2019-02-21 ·

A method of validating a signal received by a radio from a radio station includes determining a strength of the signal as received by the radio, ascertaining a frequency of the signal, and calculating a first distance between the radio and the radio station dependent upon the strength of the signal as received by the radio. A location and a broadcast range of the radio station are found in a database based on the frequency of the signal, A second distance between the radio and the radio station is computed based on a known location of the radio and the location of the radio station as found in the database. The radio station is validated only if the first distance and the second distance are within a margin of error and if the second distance is within the broadcast range of the radio station.

PROTECTION OF PERSONAL DATA CONTAINED ON AN RFID-ENABLED DEVICE
20190050611 · 2019-02-14 ·

A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.

Passive device shield with proximity change alert
RE047189 · 2019-01-01 · ·

A passive device shield 2 used to protect a passive chip containing data embedded in a device from remote skimming at a frequency which activates the chip to send the data, the shield 2 being removable to enable authorized reading of the chip data. The shield 2 is adapted to block the frequencies which activate the chip, the shield 2 further having a transmitter 18 which sends a coupling signal at a non-blocked frequency to a receiver 20, at least one of the receiver/and transmitter 18 having means to monitor the distance between the transmitter 18 and receiver 20 and an alert means to indicate when a predetermined distance has been exceeded.

DIGITAL CAPACITY CENTRIC DISTRIBUTED ANTENNA SYSTEM

Disclosed herein is an architecture for a Digital Capacity Centric Distributed Antenna System (DCC-DAS) that dynamically manages and distributes resources in different locations where there is demand for capacity. The DCC-DAS also allows for the routing of resources to other applications such as location finding devices, jamming devices, repeaters, etc.

Switched transmit antennas with no feedback for multipath reduction
20180351691 · 2018-12-06 · ·

A communication system is provided comprising a transmitter coupled to a switch, which is further coupled to at least two antennas for switching the transmit signal to one of the antennas, with no feedback. The communication system further comprises at least one receiver for receiving the transmitted signal.

The communication system in the present invention is able to help mitigate the effects of multipath. Previous attempts to mitigate the effects of multipath suffer from various problems: increased complexity needed to measure channel parameters and a feedback loop to switch the transmit antenna based on the parameters.

The system is particularly useful when deployed in a MAS system or a jamming system.

Ground and air vehicle electromagnetic signature detection and localization

Systems and methods can support identifying radio transmissions associated with autonomous or remote-controlled vehicles. Radio frequency signals may be received using one or more sensors, wherein the sensors comprise radio receivers. Radio frequency fingerprints may be identified within one or more of the radio frequency signals, wherein the radio frequency fingerprints comprise radio signal characteristics or radio hardware identifiers. A stored radio frequency fingerprint may be determined as matching the received radio frequency fingerprint. A motion characteristic may be computed. The received radio frequency fingerprint may be associated with an autonomous or remote-controlled vehicle based upon the stored radio frequency fingerprint or the motion characteristic. Information regarding the identified autonomous or remote-controlled vehicle may be presenting to one or more operator interfaces.

Electromagnetic threat detection and mitigation in the Internet of Things

Systems and methods can support threat detection using electromagnetic signatures. One or more sensors comprising radio receivers may receive radio frequency signals within an electromagnetic environment. Radio frequency signatures may be identified from one or more of the radio frequency signals. A baseline electromagnetic environment may be established from the radio frequency signatures. The radio frequency signatures may be monitored over time to detect variations from the baseline electromagnetic environment. Variations in the electromagnetic environment may be evaluated against stored threat signatures. Operator interfaces may present indications of threats determined from evaluating the variations in the electromagnetic environment.

RFID DISRUPTION DEVICE AND RELATED METHODS
20180276517 · 2018-09-27 ·

Devices and methods of disrupting data transfer between an RFID interrogation device (50, 50) and an RFID data storage device (30, 30) to be protected, are provided. An example of an embodiment of an RFID signal disruptor device includes a container (41, 141) and an RFID signal disruptor circuit (151, 161, 161, 171, 171, 271, 271) configured to substantially disrupt the signal provided by the RFID interrogation device (50, 50) when the RFID signal disruptor device is positioned to protect the RFID data storage device (30, 30). The RFID signal disruptor device can also include an interrogation indicator (63, 296) configured to indicate to a user of the RFID data storage device (30, 30) that an unauthorized RFID interrogation device (50, 50) is attempting to interrogate the RFID data storage device (30, 30) when the RFID signal disruptor device is positioned in close proximity to the RFID data storage device (30, 30) to provide protection thereto and when the RFID interrogation device (50, 50) is producing the interrogation signal.

Enodeb with masking functionality and aircraft
10084566 · 2018-09-25 · ·

A method for masking communication signals, particularly for masking terrestrial RF communication signals on board of an aircraft, includes parallelizing a first information data stream to be transmitted on a first LTE transmission channel. The first LTE transmission channel has a first channel transmission bandwidth and at least one guard band adjacent to the channel transmission bandwidth. The first information data stream is spread over mutually orthogonal data subcarriers within the first channel transmission bandwidth. A CAZAC sequence is generated. The generated CAZAC sequence is spread over guard band subcarriers within the at least one guard band. The first information data stream is transmitted over the data subcarriers in parallel to the CAZAC sequence over the guard band subcarriers.