Patent classifications
H04K2203/16
Methods and systems for enabling end-user equipment at an end-user premise to effect communications when an ability of the end-user equipment to communicate via a communication link connecting the end-user equipment to a communications network is disrupted
A method for effecting communications, such as telephone calls, accesses to data network sites, alarm system communications, and/or other communications, over a communications network. The method comprises: determining that an ability of first end-user equipment at a first end-user premise to communicate via a first communication link connecting the first end-user equipment to the communications network is disrupted; establishing a wireless communication link between the first end-user equipment and second end-user equipment at a second end-user premise; and causing information transmitted by or destined for the first end-user equipment to be exchanged over the communications network via the wireless communication link and a second communication link connecting the second end-user equipment to the communications network. Also provided are apparatus and computer-readable media containing a program element executable by a computing system to perform such a method.
Detecting network jamming
A method in a wireless device comprises monitoring one or more aspects of signaling with a network for abnormal signals indicative of network jamming. The method comprises detecting, based on the monitored one or more aspects of signaling with the network, one or more abnormal signals indicative of network jamming.
CELLULAR COMMUNICATIONS UNDER RADAR INTERFERENCE
Methods of reducing the interferences of radar signals with uplink or downlink data communication signals in a wireless system for both data communication and radar sensing may include configuring the transmitters of the radar signals and the data communication signals such that the data communication signals and the radar signals are transmitted using different radio frequency resources, and/or configuring the receivers of the data communication signals to receive the data communication signals using a receive beam that does not collide with radar beams. The methods may also include using a reference signal for both downlink data communication and radar sensing and/or determining a Quasi-Colocation (QCL) configuration for downlink data reception based on information regarding a radar beam.
METHOD FOR SECURING A COMMUNICATION USER EQUIPMENT FROM A JAMMING ATTACK
A method for a user equipment operating in a cellular network having a plurality of base stations, the user equipment operating on at least one of the base stations, hereinafter the serving base station, for the case of a communication loss to its serving base station, whereby the conditions relating to the serving base station or the corresponding frequency fulfills the criteria concerning jamming. The method includes the steps of: scanning for accessible base stations of the cellular network, examining the at least one base station being identified through the scanning step, by means of signalling message, evaluating the response behavior of the at least one base station, wherein in consideration of the response behavior of at least one of said base station if said base station is rated as suspicious: indicating a jamming situation, otherwise camping on at least one of the base stations.
DISTRIBUTED RATE ALLOCATION AND COLLISION DETECTION IN WIRELESS NETWORKS
A hybrid cellular and non-cellular multi-hop communication device, including a hand-held wireless device having one or more antennas, a cellular wireless interface connected to at least some of the one or more antennas, and a non-cellular wireless interface connected to at least some of the one or more antennas. The non-cellular wireless interface may include a rate allocator configured to select a physical-layer rate of transmission of data from the non-cellular wireless interface based on a queue length of data to be transmitted from the hand-held cellular device and a transmitter configured to wirelessly transmit data from the queue and adjust physical-layer transmission parameters based on a physical-layer rate selected by the rate allocator.
DETECTING NETWORK JAMMING
A method in a wireless device comprises monitoring one or more aspects of signaling with a network for abnormal signals indicative of network jamming. The method comprises detecting, based on the monitored one or more aspects of signaling with the network, one or more abnormal signals indicative of network jamming.
METHOD AND APPARATUS FOR DETECTING AND JAMMING TRANSMITTERS AND RECEIVERS
A method to detect and jars an electromagnetic transmission includes detecting electromagnetic radiation from an electromagnetic radiating source, determining the type of the received electromagnetic radiation by comparing the signature of the received signal with signatures from a database, selecting the waveform and frequency to disturb the determined type, and transmitting a waveform with a frequency to jam the electromagnetic transmission. A system to jam an electromagnetic transmission is also provided.
Electromagnetic Interference Control Method and Related Product
Disclosed are an electromagnetic interference control method and a related product. The method is for an electronic device including an antenna and a camera. The method includes: obtaining a first operating frequency of the camera and a second operating frequency of the antenna; determining the second operating frequency is interfered; in response to the second operating frequency being interfered, obtaining a target frame rate range; determining an operating frequency of the camera corresponding to each frame rate in the target frame rate range; obtaining an operating frequency list; determining at least one third operating frequency from the operating frequency list; and selecting one third operating frequency from the at least one third operating frequency as a first target operating frequency; determining a first target frame rate; operating the camera at the first target operating frequency; and performing the video function based on the first target frame rate.
ANTI-EAVESDROPPING METHOD FOR IOV BASED ON INTERMITTENT COOPERATIVE JAMMING
Disclosed is an anti-eavesdropping method for the Internet of Vehicles (IoV) based on intermittent cooperative jamming. The method comprises: on the premise of effectively preventing an illegitimate user V.sub.e from information eavesdropping, first establishing optimization problems for the purpose of minimizing an energy consumption of a cooperative jamming user V.sub.j; analyzing unique communication characteristics of the IoV based on the Wireless Access in Vehicular Environments (WAVE) protocol, to obtain time structures of physical-layer data packets in the IoV and physical-layer data packet duration; and calculating the shortest physical-layer data packet duration in the IoV; then solving an optimal cooperative jamming scheme for any available power range for the cooperative jamming user V.sub.j; and finally, conducting, by the cooperative jamming user V.sub.j, periodic repetition according to the solved optimal cooperative jamming schemes in a period of data transmission between legitimate users, until transmission between the legitimate users ends.
Automatic repeat-request system for providing absolute safety and authentication in wireless networks
A system and method for providing confidentiality against eavesdropping and authentication against impersonation attacks for advanced wireless communication systems are disclosed. The method exploits ARQ as a MAC layer mechanism and artificial noise as a physical layer mechanism with maximal ratio combining to achieve secrecy. An artificial noise, not requiring class space in the channel, is designed and added to the data package based on the QoS requirements and channel condition between legitimate parties. Basically, a special AN, which does not require null-space in the channel, is designed based on the QoS requirements and the channel condition between the legitimate parties and injected to the data packet. If the same packet is requested by the legitimate receiver (Bob), an AN cancelling signal is designed and added to the next packet. Then, an AN-free packet is obtained by using MRC process at Bob, while deteriorating the eavesdropper's performance.