H04K2203/16

Method and system for producing a jammer signal

A distributed antenna system with a plurality of remote radio units is disclosed. The distributed antenna system includes a jammer signal generator for generating a jammer signal in at least one frequency range to be blocked on detection of an uplink signal in a coverage area, as well as at least one antenna element for transmitting the generated jammer signal in the coverage area. The jammer signal will ensure that any mobile devices or stations within the coverage area are unable to transmit radio signals as the frequency range(s) on which the radio signals should be transmitted are blocked by the jammer signal.

Network jamming detection and remediation
11250687 · 2022-02-15 · ·

Methods and systems for remediation of jammed networks are provided. Exemplary methods include determining by a base unit of a jammed network and if outside connectivity available. The connectivity can include wired and wireless broadband networks. If connectivity is available, at least one external service is notified. Further, a user device can be notified. A local alert can be generated in the form of a phone call or test message. Also, a local action can be taken. Information associated with the jammed network is stored for later delivery if connectivity is not available where the base unit is located in a residence. Further, an alert can be issued in response to the detected network jamming, the alert being at least one of: sounding an audible alarm, showing a visual alarm indication, communicating with law enforcement, and communicating with an alarm monitoring station.

NFC tags with proximity detection

Systems, apparatuses and methods provide for detecting the proximate placement of an external NFC reader to a specific location on a display surface. The display surface can be intended for viewing indicia and enabling interaction with an NFC communication device embedded within the display. A circuit can control an NFC security system that can scan for unauthorized tags affixed to the surface of a display. The NFC security system may be activated by an NFC enabled mobile phone placed proximate to the indicated region for receiving an NFC coded message from the display. An NFC security scan can be performed prior to the mobile phone reading the message from the intended NFC tag in the display. Enabling interactive display modes can allow for making selections indicated on the display or detecting motion gestures across the face of the display.

Apparatus, system, and method for detecting the presence of an intoxicated driver and controlling the operation of a vehicle
09758039 · 2017-09-12 · ·

A system is disclosed to control operation of a vehicle based on a blood alcohol content of a driver. A detector includes a sensor configured to measure an alcohol content of air in a predetermined three-dimensional zone within a vehicle. The three-dimensional zone is proximal to a driver seat side of the vehicle. The sensor is configured to measure the alcohol content of the air independent of interaction of a driver with the detector. The sensor is configured to produce an electrical signal representative of a blood alcohol content of the driver. A controller is electrically coupled to the detector. The controller is configured to determine a tamper event. Optionally, the controller is configured to detect a presence of the driver within the vehicle. A method for preventing operation of a vehicle by an intoxicated person also is disclosed.

INTEGRATION OF CELLULAR PHONE DETECTION AND REPORTING INTO A PRISON TELEPHONE SYSTEM
20220231781 · 2022-07-21 · ·

The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.

METHOD AND SYSTEM FOR DETECTING, MONITORING, AND CONTROLLING A MOBILE COMMUNICATION DEVICE
20210394766 · 2021-12-23 ·

Disclosed herein is a method and system for detecting, monitoring and/or controlling one or more of mobile services for a mobile communication device (also referred to herein as a Controllable Mobile Device or CMD), and in particular, when the device is being used and the vehicle, operated by the user of the device, is moving. In addition, one aspect of the invention generally relates to a method and system for modifying a user's driving behaviors, in particular to a system and method for modifying a user's unsafe driving behaviors, e.g., using one or more services of a controllable mobile device while driving.

Anti-eavesdropping method for IoV based on intermittent cooperative jamming

Disclosed is an anti-eavesdropping method for the Internet of Vehicles (IoV) based on intermittent cooperative jamming. The method comprises: on the premise of effectively preventing an illegitimate user V.sub.e from information eavesdropping, first establishing optimization problems for the purpose of minimizing an energy consumption of a cooperative jamming user V.sub.j; analyzing unique communication characteristics of the IoV based on the Wireless Access in Vehicular Environments (WAVE) protocol, to obtain time structures of physical-layer data packets in the IoV and physical-layer data packet duration; and calculating the shortest physical-layer data packet duration in the IoV; then solving an optimal cooperative jamming scheme for any available power range for the cooperative jamming user V.sub.j; and finally, conducting, by the cooperative jamming user V.sub.j, periodic repetition according to the solved optimal cooperative jamming schemes in a period of data transmission between legitimate users, until transmission between the legitimate users ends.

A CONTROLLER FOR CONTROLLING WIRELESS COMMUNICATION BETWEEN A NODE AND A MASTER DEVICE IN A WIRELESS NETWORK AND A METHOD THEREOF
20230269021 · 2023-08-24 ·

A controller for controlling wireless communication between a node and a master device in a wireless network; wherein the controller comprises a processor arranged for: determining a first directionally restricted jamming area relative to the node; determining a second directionally restricted jamming area relative to the master device; controlling a first directional antenna to transmit a first jamming signal in the first determined directionally restricted jamming area during a predetermined time period; and controlling a second directional antenna to transmit a second jamming signal in the second determined directionally restricted jamming area during the predetermined time period.

Interference avoidance for ranging and positioning of distributed devices

Disclosed are some examples of techniques for ranging and positioning of distributed devices to avoid local and/or periodic interference. For example, an initiator user equipment (UE) can broadcast a positioning reference signal (PRS) message of a current positioning session to responder UEs. One or more characteristics of PRS transmission associated with a first responder UE in the current positioning session can be determined. Based on the characteristic(s), interference with the first responder UE can be identified, which can cause the initiator UE to change the broadcast order of the responder UEs for a next positioning session.

Selective jamming detection based on comparing two or more signal measurement quantities

Methods implemented by a processor in a wireless device for detecting the presence in a network of a jammer or non-benign entity that targets physical layer channels in a communication network are disclosed. Various embodiments may determine a first signal measurement quantity based on a first physical layer communication, determine a second signal measurement quantity based on a second physical layer communication, determine a difference between the first signal measurement quantity and the second signal measurement quantity, determine whether the difference between the first signal measurement quantity and the second signal measurement quantity satisfies a threshold, determine whether a jammer or non-benign entity is present in the network in response to determining that the difference between the first signal measurement quantity and the second signal measurement quantity satisfies the threshold, and perform a mitigation operation in response to determining that a jammer or non-benign entity is present in the network.