H04K2203/14

Privacy Device For Smart Speakers
20240406648 · 2024-12-05 ·

Systems, apparatuses, and methods are described for a privacy blocking device configured to prevent receipt, by a listening device, of video and/or audio data until a trigger occurs. A blocker may be configured to prevent receipt of video and/or audio data by one or more microphones and/or one or more cameras of a listening device. The blocker may use the one or more microphones, the one or more cameras, and/or one or more second microphones and/or one or more second cameras to monitor for a trigger. The blocker may process the data. Upon detecting the trigger, the blocker may transmit data to the listening device. For example, the blocker may transmit all or a part of a spoken phrase to the listening device.

DETERRENT FOR UNMANNED AERIAL SYSTEMS
20170285142 · 2017-10-05 ·

A system (100) for providing an integrated multi-sensor detection and countermeasure against commercial unmanned aerial systems/vehicles (44) and includes a detecting element (103, 104, 105), a tracking element (103,104, 105) an identification element (103, 104, 105) and an interdiction element (102). The detecting element detects an unmanned aerial vehicle in flight in the region of, or approaching, a property, place, event or very important person. The tracking element determines the exact location of the unmanned aerial vehicle. The identification/classification element utilizing data from the other elements generates the identification and threat assessment of the UAS. The interdiction element, based on automated algorithms can either direct the unmanned aerial vehicle away from the property, place, event or very important person in a non-destructive manner, or can disable the unmanned aerial vehicle in a destructive manner. The interdiction process may be over ridden by intervention by a System Operator/HiL.

DETERENT FOR UNMANNED AERIAL SYSTEMS
20170248687 · 2017-08-31 ·

A system for providing integrated detection and countermeasures against unmanned aerial vehicles include a detecting element, a location determining element and an interdiction element. The detecting element detects an unmanned aerial vehicle in flight in the region of, or approaching, a property, place, event or very important person. The location determining element determines the exact location of the unmanned aerial vehicle. The interdiction element can either direct the unmanned aerial vehicle away from the property, place, event or very important person in a non-destructive manner, or can cause disable the unmanned aerial vehicle in a destructive manner.

Deterent for unmanned aerial systems

A system (100) for providing an integrated multi-sensor detection and countermeasure against commercial unmanned aerial systems/vehicles (44) and includes a detecting element (103, 104, 105), a tracking element (103,104, 105) an identification element (103, 104, 105) and an interdiction element (102). The detecting element detects an unmanned aerial vehicle in flight in the region of, or approaching, a property, place, event or very important person. The tracking element determines the exact location of the unmanned aerial vehicle. The identification/classification element utilizing data from the other elements generates the identification and threat assessment of the UAS. The interdiction element, based on automated algorithms can either direct the unmanned aerial vehicle away from the property, place, event or very important person in a non-destructive manner, or can disable the unmanned aerial vehicle in a destructive manner. The interdiction process may be over ridden by intervention by a System Operator/HiL.

DETERENT FOR UNMANNED AERIAL SYSTEMS
20170192089 · 2017-07-06 ·

A system (100) for providing an integrated multi-sensor detection and countermeasure against commercial unmanned aerial systems/vehicles (44) and includes a detecting element (103, 104, 105), a tracking element (103,104, 105) an identification element (103, 104, 105) and an interdiction element (102). The detecting element detects an unmanned aerial vehicle in flight in the region of, or approaching, a property, place, event or very important person. The tracking element determines the exact location of the unmanned aerial vehicle. The identification/classification element utilizing data from the other elements generates the identification and threat assessment of the UAS. The interdiction element, based on automated algorithms can either direct the unmanned aerial vehicle away from the property, place, event or very important person in a non-destructive manner, or can disable the unmanned aerial vehicle in a destructive manner. The interdiction process may be over ridden by intervention by a System Operator/HiL.

Deterent for unmanned aerial systems

A system for providing integrated detection and countermeasures against unmanned aerial vehicles include a detecting element, an location determining element and an interdiction element. The detecting element detects an unmanned aerial vehicle in flight in the region of, or approaching, a property, place, event or very important person. The location determining element determines the exact location of the unmanned aerial vehicle. The interdiction element can either direct the unmanned aerial vehicle away from the property, place, event or very important person in a non-destructive manner, or can cause disable the unmanned aerial vehicle in a destructive manner.

Communication network element and method of mitigating an optical jamming attack against an optical communication system

A communication network element (10) comprising: an optical path (12) for an optical communication signal (14); a monitoring port (16) arranged to output an optical monitoring signal; an optical splitter (20) provided in the optical path, the optical splitter arranged to receive the optical communication signal and to split off a part of the optical communication signal to form the optical monitoring signal; and optical isolation apparatus (22) connected between the optical splitter and the monitoring port, the optical isolation apparatus arranged to transmit the optical monitoring signal propagating towards the monitoring port and arranged to apply an attenuation, IA, to an attacking optical signal (24) propagating from the monitoring port towards the optical splitter to thereby prevent a substantial part of the attacking optical signal being transmitted to the optical path.

SYSTEM AND METHOD FOR PREVENTING UNAUTHORIZED RECORDING, RETRANSMISSION AND MISUSE OF AUDIO AND VIDEO

In some embodiments, a method includes receiving, at a device, digital audio content to be converted by a digital-to-analog converter to produce analog audio content. The digital audio content has at least one audible frequency. The method also includes selecting, at the device, a first signal and a second signal to output with the analog audio content. The first signal has an inaudible carrier frequency and a bandwidth, and the second signal also has an inaudible carrier frequency and a bandwidth. A difference between the first signal and the second signal is an undesired audible signal. The method further includes outputting, from the device, the analog audio content, the first signal and the second signal, such that when the analog audio content is detected by a recording device the undesired audible signal is detected with the analog audio content.

SPECIAL ENERGY SENSING ESPIONAGE DETECTOR
20170012733 · 2017-01-12 ·

An energy sensing espionage detector is disclosed. The detector is designed to alert on compromised LED lighting sources used by spies on unsuspecting corporations and individuals. The detector counters one threat vector that is emerging from newly mandated energy policies to replace conventional lighting with energy efficient LED lighting. The detector senses that information is being transmitted by the light source using pulsed or modulated energy that is not detectable by the human eye.

SIGNAL MASKING FOR SECURE BACKSCATTERED COMMUNICATION

Examples are disclosed that relate to improving security of radio frequency (RF) backscattered communication. In one example, a RF device includes a primary RF signal receiver, a secondary signal receiver, a signal mixer, and a transmitter. The primary RF signal receiver is configured to receive a RF carrier signal sent from a base station. The secondary signal receiver is configured to receive a masking signal from the base station. The signal mixer is configured to generate a response signal based at least on the RF carrier signal and generate a mixed signal by mixing the response signal and the masking signal. The transmitter is configured to broadcast the mixed signal, via backscattering, as a masked backscattered signal.