H04K3/88

Electromagnetic threat detection and mitigation in the Internet of Things

Systems and methods can support threat detection using electromagnetic signatures. One or more sensors comprising radio receivers may receive radio frequency signals within an electromagnetic environment. Radio frequency signatures may be identified from one or more of the radio frequency signals. A baseline electromagnetic environment may be established from the radio frequency signatures. The radio frequency signatures may be monitored over time to detect variations from the baseline electromagnetic environment. Variations in the electromagnetic environment may be evaluated against stored threat signatures. Operator interfaces may present indications of threats determined from evaluating the variations in the electromagnetic environment.

Apparatus and method for protecting communication device of railroad car

An apparatus and method for protecting a communication device of a railroad car is provided. The apparatus includes an antenna portion configured to include main antennas and an auxiliary antenna, a main receiver configured to check a magnitude of a received signal transferred through the main antennas of the antenna portion, an auxiliary receiver configured to check a magnitude of a received signal transferred through the auxiliary antenna of the antenna portion, and a controller configured to compare the magnitude of the signal received by the main receiver and the magnitude of the signal received by the auxiliary receiver, determine whether there is a jamming signal according to a comparison result, and take a preset countermeasure when it is determined that there is a jamming signal.

Detection and protection against jam intercept and replay attacks

Method and apparatus are disclosed for detection and protection against jam intercept and replay attacks. An example disclosed key fob includes a first wireless transceiver tuned to communicate via a first frequency band, second wireless transceiver tuned to communicate via a second frequency band, and a communicator. The first frequency band is different than the second frequency band. The example communicator sends a first message via the first wireless transceiver in response to activation of a first button. Additionally, the example communicator, in response to not receiving a second message via the second wireless transceiver, provides an alert.

Alarm Initiation When Sensor is Intentionally Jammed
20180182234 · 2018-06-28 · ·

Concepts and technologies are disclosed herein for alarm initiation when a sensor is intentionally jammed. According to one aspect disclosed herein, a connected home system can include a controller device and a sensor device. The sensor device can include a processor and memory. The memory can store sensor instructions that, when executed by the processor, cause the sensor device to perform sensor operations. In particular, the sensor device can detect a jamming signal originating, for example, from a jamming device that is intentionally attempting to jam operations of the sensor device. The sensor device can determine whether the jamming signal is above a jamming alarm threshold. If the sensor device determines that the jamming signal is above the jamming alarm threshold, the sensor device can generate a jamming alarm event that is directed to the controller device. The sensor device can send the jamming alarm event to the controller device.

SYSTEMS AND METHODS FOR VEHICLE TRACKING
20180091252 · 2018-03-29 ·

The invention concerns a vehicle tracking network including a plurality of subscriber vehicles and a control-center; and systems and methods for tracking vehicles, which are subscribers to such vehicle tracking network. In certain implementations, the method for tracking a subscriber vehicle includes the following operations carried out at the subscriber vehicle: monitoring operation of one or more services related to at least one of a wireless network communication service and positioning service associated with the subscriber vehicle; upon detecting a failure in at least one of said services, generating a corresponding distress signal encoded to be identifiable by other subscriber vehicle(s) of the vehicle tracking network; and broadcasting the encoded distress signal such that it is detectable by one or more of the other subscriber vehicles of the vehicle tracking network, which are located in the vicinity of the subscriber vehicle broadcasting the distress signal. Another subscriber vehicle(s), which receive the distress signal, may thereby initiate automatic notification of the condition of the vehicle broadcasting the distress signal to the control center.

Detection And Protection Against Jam Intercept And Replay Attacks
20180089918 · 2018-03-29 ·

Method and apparatus are disclosed for detection and protection against jam intercept and replay attacks. An example disclosed key fob includes a first wireless transceiver tuned to communicate via a first frequency band, second wireless transceiver tuned to communicate via a second frequency band, and a communicator. The first frequency band is different than the second frequency band. The example communicator sends a first message via the first wireless transceiver in response to activation of a first button. Additionally, the example communicator, in response to not receiving a second message via the second wireless transceiver, provides an alert.

Alarm Initiation When Sensor is Intentionally Jammed
20180061218 · 2018-03-01 · ·

Concepts and technologies are disclosed herein for alarm initiation when a sensor is intentionally jammed. According to one aspect disclosed herein, a connected home system can include a controller device and a sensor device. The sensor device can include a processor and memory. The memory can store sensor instructions that, when executed by the processor, cause the sensor device to perform sensor operations. In particular, the sensor device can detect a jamming signal originating, for example, from jamming device that is intentionally attempting to jam operations of the sensor device. The sensor device can determine whether the jamming signal is above a jamming alarm threshold. If the sensor device determines that the jamming signal is above the jamming alarm threshold, the sensor device can generate a jamming alarm event that is directed to the controller device. The sensor device can send the jamming alarm event to the controller device.

Alarm initiation when sensor is intentionally jammed
09905120 · 2018-02-27 · ·

Concepts and technologies are disclosed herein for alarm initiation when a sensor is intentionally jammed. According to one aspect disclosed herein, a connected home system can include a controller device and a sensor device. The sensor device can include a processor and memory. The memory can store sensor instructions that, when executed by the processor, cause the sensor device to perform sensor operations. In particular, the sensor device can detect a jamming signal originating, for example, from a jamming device that is intentionally attempting to jam operations of the sensor device. The sensor device can determine whether the jamming signal is above a jamming alarm threshold. If the sensor device determines that the jamming signal is above the jamming alarm threshold, the sensor device can generate a jamming alarm event that is directed to the controller device. The sensor device can send the jamming alarm event to the controller device.

Radio frequency jamming or interference detection and mitigation in an electronic monitoring system
12166572 · 2024-12-10 · ·

An electronic monitoring system and method are provided. The electronic monitoring system monitors communication of data between a device primary radio of a monitoring device and a hub primary radio through a primary communication path. Communication of the data is transferred to a secondary communication path between a device secondary radio of the monitoring device and a hub secondary radio in response to the detection of a disruption on the primary communication path resulting from interference or jamming of communications over the primary communication path. The primary and secondary radios operate a different frequencies.

METHODS AND SYSTEMS FOR ENABLING END-USER EQUIPMENT AT AN END-USER PREMISE TO EFFECT COMMUNICATIONS WHEN AN ABILITY OF THE END-USER EQUIPMENT TO COMMUNICATE VIA A COMMUNICATION LINK CONNECTING THE END-USER EQUIPMENT TO A COMMUNICATIONS NETWORK IS DISRUPTED

A method for effecting communications, such as telephone calls, accesses to data network sites, alarm system communications, and/or other communications, over a communications network. The method comprises: determining that an ability of first end-user equipment at a first end-user premise to communicate via a first communication link connecting the first end-user equipment to the communications network is disrupted; establishing a wireless communication link between the first end-user equipment and second end-user equipment at a second end-user premise; and causing information transmitted by or destined for the first end-user equipment to be exchanged over the communications network via the wireless communication link and a second communication link connecting the second end-user equipment to the communications network. Also provided are apparatus and computer-readable media containing a program element executable by a computing system to perform such a method.