H04K2203/22

VEHICLE ACCESS WITH SELECTIVE JAMMING RADIO SIGNAL
20210058183 · 2021-02-25 ·

A jamming radio signal is selectively outputted based on an access signal. The jamming radio signal is configured to prevent an interrogation signal of a vehicle to complete an authentication of a vehicle key of the vehicle.

METHOD FOR ANTI-DRONE USING GPS SPOOFING SIGNAL AND SYSTEM THEREFORE

Disclosed are an anti-drone method using a GPS spoofing signal and a system thereof. According to an embodiment of the inventive concept, an anti-drone method may include injecting a GPS spoofing signal to analyze a drone feature of a target drone and hijacking the target drone by injecting a GPS spoofing signal into the target drone based on a drone hijacking strategy corresponding to the analyzed drone feature among predefined drone hijacking strategies. The analyzing of the drone feature may include injecting the GPS spoofing signal to analyze a safety device mechanism (GPS fail-safe) and a path-following algorithm of the target drone.

LED light broad band over power line communication system

An LED light and communication system is in communication with a broadband over power line communications system. The LED light and communication system includes at least one optical transceiver. The optical transceiver includes a light support having a plurality of light emitting diodes and at least one photodetector attached thereto, and a processor. The processor is in communication with the light emitting diodes and the at least one photodetector. The processor is constructed and arranged to generate a communication signal.

Deterrent for unmanned aerial systems using data mining and/or machine learning for improved target detection and classification

A system for providing integrated detection and deterrence against an unmanned vehicle including but not limited to aerial and similar technology unmanned systems using a detection element, a tracking element, an identification element and an interdiction or deterrent element. Elements contain sensors that observe real time quantifiable data regarding the object of interest to create an assessment of the object of interests risk or threat to a protected area of interest. This assessment is based on the application of machine learning and data mining techniques and protocols to the set of data related to the object of interest. This data product is available to third parties via a set of defined interface protocols and available API. The deterrent element, using other machine learning or artificially intelligent algorithms, selects from a variable menu of possible deterrent actions not limited to those actions currently included in this embodiment, but includes those actions available from third parties such as specialized hunter drones. Though designed for autonomous action, a Human in the Loop may override the automated system solutions.

Systems and methods for cyber-physical vehicle management, detection and control

A cyber-physical vehicle management system may allow for highly reliable and authentic identity management of cyber-physical systems, unforgeable legal interception devices, and robust relay nodes. A cyber-physical vehicle management system may also provide for human and object bi-directional authenticity verification. In some cases, a cyber physical management system may enable a cyber physical vehicle (CPV) detection and intervention system which may be capable or detection, identification, capture, seizure, and immobilization of CPVs. In some embodiments the CPV detection and intervention system includes a geocoding laser subsystem for determining a location of a CPV.

Secure control and operation of drones

Techniques are described for the exchange of control signals between a controlled unmanned aircraft (i.e. drone) and a ground control station and for the transmission of communication signals, such as video, from the drone to the ground control station so that the signals are more difficult to intercept or jam. The video signal transmitted from the drone can be an analog RF signal employing one or more of video scrambling, RF signal inversion, hopping, usage of a wide frequency range and other techniques. To secure the control signals between the drone and the ground control station, techniques can include hopping, encryption and use of a wide frequency range.

GNSS simulation to disrupt unmanned vehicle operation

Several examples of a navigation disruption device and methods of using the same are described herein that use real-time, low-cost computation to generate conflicting/competing signals to actual Global Navigation Satellite System (GNSS) signals. For example, the novel, hand-held navigation disruption devices described herein (1) generate signals from a simulated satellite constellation, wherein the signals from the simulated satellite constellation conflict/compete with signals from one or more actual satellite constellations, and (2) transmit the signals from the simulated satellite constellation(s) towards an unmanned vehicle. The signals from the simulated satellite constellation(s) cause the unmanned vehicle to compute an incorrect position, which in turn disrupts its ability to navigate and operate effectively.

System for physically capturing and signal-defeating unmanned aerial vehicles

A system for defeating a threat unmanned aerial vehicle including a friendly unmanned aerial vehicle and a containment system. The containment system is deployable from the friendly unmanned aerial vehicle and includes a signal blocking enclosure and a capturing device. The signal blocking enclosure is formed of a conductive material for shielding radio frequency signals from propagating in or out of the signal blocking enclosure. The capturing device is configured for arresting the threat unmanned aerial vehicle and positioning an arrested threat unmanned aerial vehicle within the signal blocking enclosure.

METHOD AND SYSTEM FOR JAMMING LOCALIZATION AND SUPPORTING NAVIGATION SYSTEM
20210018936 · 2021-01-21 ·

The presently disclosed method and system exploits a received signal strength of a jamming signal emitted by a jammer to allow navigation of an object through an area containing the jamming signal. In one embodiment, the method comprises receiving a plurality of navigation data and a jamming signal when entering a jamming zone. The method then comprises repeatedly measuring the strength of the jamming signal while moving within the jamming zone. The method then comprises determining the location of the jammer based on the movement within the jamming zone and the strength of the jamming signal at multiple coordinates. The method further comprises performing movement to destination coordinates within the jamming zone at least partially based on the jammer location and the strength of the jamming signal.

SYSTEMS AND METHODS FOR DETECTING, TRACKING AND IDENTIFYING SMALL UNMANNED SYSTEMS SUCH AS DRONES
20210012668 · 2021-01-14 ·

A system for providing integrated detection and countermeasures against unmanned aerial vehicles include a detecting element, a location determining element and an interdiction element. The detecting element detects an unmanned aerial vehicle in flight in the region of, or approaching, a property, place, event or very important person. The location determining element determines the exact location of the unmanned aerial vehicle. The interdiction element can either direct the unmanned aerial vehicle away from the property, place, event or very important person in a non-destructive manner, or can cause disable the unmanned aerial vehicle in a destructive manner.