Patent classifications
H04K3/90
VIRTUAL SENSING VIA SENSOR SHARING FOR C-V2X SCHEDULING
A configuration for virtual sensing via sensor sharing for C-V2X scheduling. The apparatus receives, from a first wireless device, a message indicating a threat entity within a threat zone. The threat entity transmits data that interferes with transmission of BSMs. The apparatus determines a candidate resource of a set of candidate resources on which to transmit a BSM based at least in part on the message indicating information related to the threat entity from the first wireless device. The apparatus transmits, to at least a third wireless device, the BSM on a determined candidate resource.
Detection of GNSS interference using surveillance messages
In some examples, a system includes a transceiver configured to receive surveillance messages from Y target vehicles, where Y is an integer greater than two. The system includes processing circuitry configured to determine predicted positions of the Y target vehicles based on the surveillance messages. The processing circuitry is also configured to determine reported positions of the Y target vehicles based on later received surveillance messages. The processing circuitry is further configured to determine that respective differences between the respective predicted position and the respective reported position for X of the Y target vehicles is greater than a threshold distance. The processing circuitry is configured to determine that Global Navigation Satellite System interference has occurred in response to determining that X divided by Y is greater than a threshold level.
A device, a system, a method and computer program product for identifying interfering devices in position measurements
A interference detection device (22) perform the following actions: receiving individual position data from mobile terminals (4(j)) which individual position data indicates an area (12(j)) in which individual ones of the mobile terminals (4(j)) are located based on positioning signals received by the mobile terminals (4(j)); identifying if individual position data may have been affected by one or more interfering signals transmitted by interfering device (14(m)) and interfering with the positioning signals; (A) identifying if a number of mobile terminals (4.sub.v(j)) in a first area (18) is higher than a maximum threshold number, and, if so, determining that individual position data of the number of mobile terminals (4.sub.v(j)) may have been affected by the interfering signals; or (B) identifying if a number of the mobile terminals (4(j)) in a second area (36) is lower than a minimum threshold number; and, if so, determining that individual position data of the number of mobile terminals (4(j)) may have been affected by interfering signals; or (C) receiving further individual position data which indicates further areas (18) in which mobile terminals (4(j)) are located based on another positioning technique than a positioning technique used to determine the individual position data as received from the mobile terminals (4(j)); determining if the areas (12(j)) overlap with the further areas (18) at least to a minimum extent, and, if not, determining that individual position data of the mobile terminals (4(j)) may have been affected by the interfering signals.
DRONE TAKEOVER AND REDIRECTING SYSTEM AND METHOD EMPLOYING LANDING OF DRONES
A system, method and computer program product for controlled drone descent, and deactivation, including a drone deactivation system; and a location system. The drone deactivation system calculates positioning, signal reception, signal strength, and signal identification parameters of a target drone from the location system, and determines an attack method based on the calculated parameters. The drone deactivation system employs the determined attack method against the target drone for forcing at least one of controlled drone descent, and deactivation of the target drone.
Methods and systems for detecting and defending against invalid time signals
Some embodiments of the time resilient system and methods disclosed herein can be configured to detect and defend against invalid time signals. According to various embodiments of the disclosed technology, the time resilient system include a receiver for collecting time signals sourced from an external clock. By way of example only, the external clock may be a high precision clock housed within a Global Positioning System. Other embodiments may include an internal clock calibrated to a time reflected on the external clock so that the internal clock and the external clock are synchronized. Additionally, a controller may monitor changes in time signals of the external over a period of time against the internal clock, where the system is alerted of a timing attack when the time signals collected from the receiver deviate a pre-determined time range with the time of the internal clock.
Identifying, tracking, and disrupting unmanned aerial vehicles
Systems, methods, and apparatus for identifying, tracking, and disrupting UAVs are described herein. Sensor data can be received from one or more portable countermeasure devices or sensors. The sensor data can relate to an object detected proximate to a particular airspace. The system can analyze the sensor data relating to the object to determine a location of the object and determine that the object is flying within the particular airspace based at least in part on location data. A portable countermeasure device can be identified that corresponds to the location of the object. The system can transmit information about the object to the identified portable countermeasure device. The portable countermeasure device can transmit additional data relating to the object to the system.
Intelligent spectrum control methods and systems
Embodiments of the present disclosure relate to a spectrum control system. The system comprises one or more high frequency (HF) antennas, one or more multi-band (MB) antennas, and one or more datalinks. A spectrum management processor is configured to receive signals from the one or more HF and MB antennas and the one or more datalinks, and switch to one or more alternate radio-frequency (RF) channels for communications and/or position, navigation, and timing (PNT) information in response to a failure in a current communication channel and/or a global positioning system (GPS) signal.
Method and device for detecting a decoy operation of a GNSS system
A method of detecting an operation to spoof a first positioning device carried by a first vehicle moving in a zone in which at least one second vehicle carrying a second positioning device is also moving, the method comprising the step of causing at least one first positioning value to be calculated for each vehicle from initial satellite signals received by each device; the method being characterized in that it further comprises the steps of: causing the second device to initiate a latching stage in order to make a new search for satellite signals and using the new satellite signals received by the second device to calculate a second positioning value for the second vehicle at the same instant as the first value; comparing the first and second values relating to the second vehicle; and issuing a warning when the two values do not coincide.
System and method for nulling or suppressing interfering signals in dynamic conditions
A system and method for nulling or suppressing interfering signals directed toward moving platforms based, at least in part, on dynamic motion data of the moveable platform is provided. The system may be an interference nulling system carried by a moveable platform and may include an antenna array including two or more antenna elements that generates at least one initial steerable null radiation pattern, dynamic motion data logic that determines dynamic motion data of the moveable platform; and update logic that updates the at least one initial steerable null radiation pattern based, at least in part, on the dynamic motion data. The at least one updated steerable null radiation pattern is directed toward a direction from which interfering signals are being transmitted from an interfering signal source.
Ultra-wide band electromagnetic jamming projector
A radio frequency (RF) jamming device includes a differential segmented aperture (DSA), a jammer source outputting a jamming signal at one or more frequencies or frequency bands to be jammed, and RF electronics that amplify and feed the jamming signal to the DSA so as to emit a jamming beam. The DSA includes an array of electrically conductive tapered projections, and the RF electronics comprise power splitters configured to split the jamming signal to aperture pixels of the DSA. The aperture pixels comprise pairs of electrically conductive tapered projections of the array of electrically conductive tapered projections. The RF electronics further comprise pixel power amplifiers, each connected to amplify the jamming signal fed to a single corresponding aperture pixel of the DSA. The RF jamming device may include a rifle-shaped housing, with the DSA mounted at a distal end of the barrel of the rifle-shaped housing.