H04K2203/18

Techniques for mitigating cross device co-existence interference

The disclosure provides techniques for reducing interference caused by a first device to a second device receiving a satellite-based positioning signal. A device such as a user equipment (UE) or base station (eNB) determines a threshold transmission power for a transmission frequency of the device. The device also determines a signal strength of the satellite-based positioning system signal at the device. The device then controls a transmission property of the device based on the signal strength of the satellite-based positioning system signal when a transmission power of the device at the transmission frequency satisfies the threshold. The device may also determine that reception of the satellite-based positioning system signal by the second device is likely to be affected by a transmission from the device at a transmission power that satisfies the threshold and control the transmission property when reception of the satellite-based positioning system signal is likely to be affected.

DUAL-GRIP PORTABLE COUNTERMEASURE DEVICE AGAINST UNMANNED SYSTEMS

A portable countermeasure device is provided comprising one or more directional antennae, one or more disruption components and at least one activator. The portable countermeasure device further comprises a body having a dual-grip configuration, with the directional antennae are affixed to a front portion of the body. The one or more disruption components may be internally mounted within the device body. The dual-grip configuration allows an operator to use his body to steady and support the device while maintaining the antenna on target. The second grip is positioned adjacent the first grip, with the first grip angled toward the rear of the device and the second grip angled toward the front of the device. The portable countermeasure device is aimed at a specific drone, the activator is engaged, and disruptive signals are directed toward the drone, disrupting the control, navigation, and other signals to and from the drone.

SYSTEM, METHOD, AND APPARATUS FOR SETTING DEVICE GEOLOCATION VIA LOCATION PROXIES
20170245280 · 2017-08-24 ·

The present invention relates to wireless networks and more specifically directed to device location confirmation based on a geolocation proxy. One embodiment includes an exemplary device location confirmation component configured to implement a device location confirmation algorithm using a cloud database configured to comprise device information including location information from the geolocation proxy. Another embodiment includes a device configured to operate in a reduced functionality radio frequency mode until a location can be confirmed through a trusted cloud service.

Authenticated time-of-flight indoor positioning systems and methods
09742737 · 2017-08-22 · ·

This disclosure describes systems, methods, and computer-readable media related to testing tools for devices. In some embodiments, a plurality of public keys may be received from a server via a secured network connection where each of the plurality of keys corresponds to a respective private key associated with an access point. A time-of-flight (ToF) measurement protocol may be initiated with one or more access points. Data generated by ToF measurement protocol with the one or more access points may be received. In some embodiments, the one or more access points may be authenticated based at least in part on the plurality of public keys. A location of a user device may be determined based at least in part on the received data.

CHANNEL SELECTION FOR DYNAMIC-FREQUENCY-SELECTION CHANNELS USING PUNCTURING

An access point in a wireless network communicates wirelessly with one or more client devices over a channel that includes a plurality of subchannels. Radar is detected on a first subchannel of the plurality of subchannels. It is determined to puncture the first subchannel, based on the detecting the radar on the first subchannel and based on one or more puncturing factors. The first subchannel is punctured, the puncturing comprising muting one or more subcarriers on the first subchannel.

Local communication interception

In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising communication circuitry configured to receive a message, and execution circuitry configured to, in response to the message comprising an instruction to intercept a direct device-to-device (D2D) communication, render the apparatus capable of storing at least in part the direct device-to-device communication in at least one of the apparatus and a memory. The intercepting may comprise lawful interception.

Electronically Steerable Parasitic Array Antenna Process

A process for an electronically steerable parasitic array (ESPAR) antenna includes operating the ESPAR antenna with a receiver in Normal Mode until an internal flag is generated by the receiver indicating jamming RF noise preventing Normal Mode operation, causing the ESPAR antenna to switch to Anti-jam Mode. Anti-jam Mode includes a Search Mode and a Track Mode. The ESPAR antenna is steered in Search Mode, causing the ESPAR antenna to beam in a circular pattern to locate a spatial direction of the jamming RF noise, identify the spatial direction of the jamming RF noise preventing Normal Mode operation, and place a null in the spatial direction of the jamming RF noise. The ESPAR antenna switches to Track Mode to maintain the null in the spatial direction of the jamming RF noise until the jamming RF noise is not present. The ESPAR antenna then returns to operating in Normal Mode.

Network jamming detection and remediation
11250687 · 2022-02-15 · ·

Methods and systems for remediation of jammed networks are provided. Exemplary methods include determining by a base unit of a jammed network and if outside connectivity available. The connectivity can include wired and wireless broadband networks. If connectivity is available, at least one external service is notified. Further, a user device can be notified. A local alert can be generated in the form of a phone call or test message. Also, a local action can be taken. Information associated with the jammed network is stored for later delivery if connectivity is not available where the base unit is located in a residence. Further, an alert can be issued in response to the detected network jamming, the alert being at least one of: sounding an audible alarm, showing a visual alarm indication, communicating with law enforcement, and communicating with an alarm monitoring station.

METHOD AND SYSTEM FOR DETECTING, MONITORING, AND CONTROLLING A MOBILE COMMUNICATION DEVICE
20210394766 · 2021-12-23 ·

Disclosed herein is a method and system for detecting, monitoring and/or controlling one or more of mobile services for a mobile communication device (also referred to herein as a Controllable Mobile Device or CMD), and in particular, when the device is being used and the vehicle, operated by the user of the device, is moving. In addition, one aspect of the invention generally relates to a method and system for modifying a user's driving behaviors, in particular to a system and method for modifying a user's unsafe driving behaviors, e.g., using one or more services of a controllable mobile device while driving.

Anti-eavesdropping method for IoV based on intermittent cooperative jamming

Disclosed is an anti-eavesdropping method for the Internet of Vehicles (IoV) based on intermittent cooperative jamming. The method comprises: on the premise of effectively preventing an illegitimate user V.sub.e from information eavesdropping, first establishing optimization problems for the purpose of minimizing an energy consumption of a cooperative jamming user V.sub.j; analyzing unique communication characteristics of the IoV based on the Wireless Access in Vehicular Environments (WAVE) protocol, to obtain time structures of physical-layer data packets in the IoV and physical-layer data packet duration; and calculating the shortest physical-layer data packet duration in the IoV; then solving an optimal cooperative jamming scheme for any available power range for the cooperative jamming user V.sub.j; and finally, conducting, by the cooperative jamming user V.sub.j, periodic repetition according to the solved optimal cooperative jamming schemes in a period of data transmission between legitimate users, until transmission between the legitimate users ends.