Patent classifications
H04K2203/22
Drone detection systems
Methods, systems, and apparatus, including computer programs encoded on storage devices, for drone-augmented emergency response services. In one aspect, a device includes a network interface, one or more sensors, one or more processors, and one or more storage devices that include instructions that are operable to perform operations. The operations include monitoring a predetermined geographic area that surrounds a particular property, determining that a drone device is within the predetermined geographic area that surrounds the particular property, determining whether the drone device that is detected within the predetermined geographic area that surrounds the property is an unauthorized drone device, and in response to determining that the drone device that is detected within the predetermined geographic area that surrounds the property is an unauthorized drone device, transmitting a signal indicating the detection of the unauthorized drone device within the predetermined geographic area that surrounds the property.
Methods and apparatus to validate data communicated by a vehicle
Methods, apparatus, systems and articles of manufacture are disclosed to validate data communicated by a vehicle. An example apparatus an anomaly detector to, in response to data communicated by a vehicle, at least one of compare an estimated speed with a reported speed or compare a location of the vehicle with a reported location. The apparatus including the anomaly detector further to generate an indication of the vehicle in response to the comparison. The apparatus further includes a notifier to discard data sent by the vehicle and notify surrounding vehicles of the data communicated by the vehicle.
System and Method for Defending Unmanned Aerial Vehicles from Hijack Cyber Attacks
The system and methods described herein aids in the defense of unmanned vehicles, such as aerial vehicles, from wifi cyber attacks. Such attacks usually do not last long and in the case of many point-to-point command and control systems, the attacks originate from close proximity to the unmanned vehicle. The system and methods described herein allow a team to rapidly identify and physically respond to an adversary trying to take control of the unmanned vehicle. Another aspect of the embodiment taught herein is to allow for the location of a wifi signal in a hands-free manner by able to visualize the source of the signal using an augmented reality display coupled to an antenna array.
Detection, analysis, and countermeasures for automated and remote-controlled devices
A computer-implementable method for generating a cognitive insight is performed by a counter-unmanned autonomous vehicle (UAV) system. The method comprises receiving training data based upon sensor measurements of at least one UAV for processing in a cognitive learning and inference system. The system performs a plurality of machine learning operations on the training data to generate a cognitive profile of the at least one UAV. A cognitive insight is generated based upon the cognitive profile, and a countermeasure is enacted against the UAV based upon the cognitive insight.
Coexistence of radio communication and radar probing
A device (112, 130) is configured to communicate data (108) on a radio channel (101, 105, 106) employing first resource elements. The device (112, 130) is further configured to participate in a radar probing (109) employing second resource elements which are orthogonal to the first resource elements.
Jamming device and jamming method
A jamming device includes a periodic signal generating circuit configured to generate a periodic signal, a noise generating circuit configured to generate a noise signal, and a sweep-signal generating circuit coupled to the periodic signal generating circuit and the noise generating circuit. The sweep-signal generating circuit is configured to generate a frequency-sweep signal based on the periodic signal and the noise signal.
LOCALIZING COMMUNICATIONS INTERFERENCE NODE
A system comprises a computer including a processor. The processor receives from each of a plurality of vehicles within a region, a respective plurality of messages and identifies for each of the plurality of vehicles, a respective communications discontinuity during which an expected message fails to be received from the respective vehicle. The processor determines, for each communications discontinuity, discontinuity edge locations at each of a beginning of the communications discontinuity and an end of the communications discontinuity. The processor further determines an interference node location based on the discontinuity edge locations.
System and method for detecting and defeating a drone
A system for detecting and defeating a drone is disclosed which includes a detection antenna array configured to detect the drone and a control signal of the drone in a 360 degree field, the detection antenna array being further configured to detect the directionality of the drone with reference to the most dominant of the control signal of the drone detected by each of a plurality of antennas within the detection antenna array; a neutralization system disposed in communication with the detection antenna array; the neutralization system including a transmission antenna configured to transmit an override signal to the detected drone, an amplifier configured to modulate a gain of the override signal, and a processing device configured to generate the override signal and control transmission of the override signal.
Directed energy delivery systems capable of disrupting air-based predatory threats
An apparatus includes a capsule configured to be launched or carried towards an unmanned aerial vehicle (UAV). The apparatus also includes a directed energy device within or carried by the capsule. The directed energy device includes a first inductor configured to generate an inductive magnetic field that is able to inductively couple into one or more electronics of the UAV in order to disable or destabilize the UAV. The capsule can be configured to be launched towards the UAV and can include a loiter mechanism (such as a rotor, umbrella, or parachute) configured to maintain a position of the capsule or to slow a descent of the capsule after launch. The capsule can also be configured to be carried towards the UAV by a different UAV, and the apparatus can further include a tether coupling the capsule to the different UAV.
INTEGRATED SECURE DEVICE MANAGER SYSTEMS AND METHODS FOR CYBER-PHYSICAL VEHICLES
Systems and methods are described for a cyber-physical vehicle management system generated by an Integrated Secure Device Manager (ISDM) Authority configured to manage licensing and approval of Cyber-Physical Vehicle (CPV)s, a public/private key pair and a unique ID for the Authority, create a self-signed Authority token signed by the private key, send the Authority token to a plurality of ISDM Node device configured to verify Module device authenticity and in communication with the Authority, store, by each Node, the Authority token, and mark, by each Node, the Authority token as trusted.