H04K2203/34

CONTROLLER FOR AND METHOD OF CONTROLLING A COUNTER MEASURE SYSTEM
20230243620 · 2023-08-03 ·

The present disclosure relates to a controller (10) for a counter measure system against unmanned aerial vehicles (UAVs), the controller (10) comprising a display device (18) and a processor configured to: receive target position data indicative of a position of a target UAV; receive effector position data indicative of a position of at least one counter measure effectors (12, 14); receive effector orientation data indicative of an orientation of the at least one counter measure effector (12, 14) relative to geographic cardinal directions; determine a field of effect (30, 32) of the at least one counter measure effector on the basis of the effector position data and the effector orientation data, said field (30, 32) of effect being indicative of an area covered by electromagnetic radiation emitted, in use, by the at least one counter measure effector; and, generate a display signal for displaying, on the display device, the position of the target UAV with respect to the field of effect (30, 32) of the at least one counter measure effector (12, 14).

Method for preventing intelligible voice recordings
11232809 · 2022-01-25 · ·

A method, for preventing the intelligible voice recording is provided. The voice of a subject or interlocutor is recorded for a given time interval thereby providing a voice recording. The voice recording is cut into shorter time interval segments thereby providing a set of voice recording segments. The set of voice recording segments is mixed in a randomly rearranged order. The mixed set of voice recording segments is spliced into a single randomly mixed voice recording. Emitting the randomly mixed voice recording during speaking of the subject or interlocutor prevents the intelligible recording of the voice of the subject or interlocutor.

DRONE DEFENSE SYSTEM
20210367700 · 2021-11-25 ·

Described herein is a system for drone defense, comprising at least one jammer and at least one radio detector, wherein the jammer is set up to send an interference signal over a frequency range, and the radio detector is set up to detect a radio control signal of a drone, the frequency range of the interference signal comprises a carrier frequency of the radio control signal or a GPS signal, wherein the jammer is configured to temporarily interrupt the interference signal and the radio detector is configured to receive the interference signal, detect the interruptions and detect the radio control signal of the drone within the interruptions of the interference signal.

RF ANTENNA PLATFORM
20220011076 · 2022-01-13 ·

An RF antenna platform selectively configurable for portable or non-portable use, the platform comprising: a body comprising at least one RF antenna for transmitting and receiving RF signals; at least one component interface provided on the body for interchangeable mounting of different types of stabilising component to the body; wherein the component interface is common to each of the different types of stabilising component such that the portable and non-portable configurations of the platform are selectively determined by the type of stabilising component mounted to the body.

SYSTEM AND METHOD FOR NEAR FIELD COMMUNICATIONS HAVING LOCAL SECURITY
20210344378 · 2021-11-04 ·

A system for near field communications is provided. The system can include a near field generator configured to generate a near field detectable signal comprising information. The system can include a near field detector configured to receive the near field detectable signal and output the information. The system can include an Electro-Magnetic (EM) shield surrounding the near field generator to block EM radio frequency (RF) signals in the vicinity of the near field generator from interfering with operations of the near field generator. The EM shield does not prevent communication of the near field detectable signal between the near field generator and the near field detector. The EM shield can be configured to reduce magnetic field loss from eddy currents in the EM shield as the near field detectable signal passes through the EM shield.

Sound Masking System
20230353935 · 2023-11-02 ·

A sound masking system according to the invention is disclosed in which one or more sound masking loudspeaker assemblies are coupled to one or more electronic sound masking signal generators. The loudspeaker assemblies in the system of the invention have a low directivity index and preferably emit an acoustic sound masking signal that has a sound masking spectrum specifically designed to provide superior sound masking in an open plan office. Each of the plurality of loudspeaker assemblies is oriented to provide the acoustic sound masking signal in a direct path into the predetermined area in which masking sound is needed. In addition, the sound masking system of the invention can include a remote control function by which a user can select from a plurality of stored sets of information for providing from a recipient loudspeaker assembly an acoustic sound masking signal having a-selected sound masking spectrum.

GAME TABLE READING SYSTEM
20220254218 · 2022-08-11 ·

The game table reading system comprises reading antennas for each of a plurality of reading areas of a game table, read-restriction antennas for each of the plurality of the reading areas, the read-restriction antennas restricting the RFID tag embedded in a game token placed in the corresponding reading area from being read by the reading antenna corresponding to the other adjacent reading areas, a reading control device that controls the reading antennas, and a read-restriction control device that controls the read-restriction antennas. The read-restriction control device causes the read-restriction antennas corresponding to the reading areas adjacent to the reading areas corresponding to the reading antenna that the reading control device causes to read, in synchronization with the reading control device.

Systems and methods for covert communications

A communications system and methods for covert communications are provided. A first transmitter that transmits an information carrying signal to a target receiver, a second transmitter and a third transmitter transmit jamming signals to the target receiver, such that the information carrying signals and the jamming signals are interleaved when received by the target receiver The information carrying signals and the jamming signals can be at least partially overlapping by an eavesdropper.

SYSTEMS AND METHODS FOR COVERT COMMUNICATIONS
20220077952 · 2022-03-10 · ·

A communications system and methods for covert communications are provided. A first transmitter that transmits an information carrying signal to a target receiver, a second transmitter and a third transmitter transmit jamming signals to the target receiver, such that the information carrying signals and the jamming signals are interleaved when received by the target receiver The information carrying signals and the jamming signals can be at least partially overlapping by an eavesdropper.

COMPOUND TRANSMISSION SECURITY (TRANSEC) FOR MILITARY-GRADE FIFTH GENERATION (5G) RADIO SYSTEMS
20210329449 · 2021-10-21 ·

A multi-user (MU) multiple-input/multiple-output (MU MIMO) module for a fifth-generation (5G) software-defined radio (SDR) network environment is disclosed. In embodiments, the MU MIMO module of a transmitting SDR system of a 5G mobile ad hoc network (MANET) or other peer-to-peer directional network receives feedback from a receiving SDR system based on a prior or current frame and generates, based on the feedback, a compound transmission security (TRANSEC) encryption key for a subsequent frame. The compound TRANSEC encryption key encrypts the transmission of the subsequent frame through a combination of frequency-hopping encryption codes, orthogonality-hopping encryption codes, and dynamic pseudorandom distribution of transmitting power among antenna elements to simulate multipath hopping. The SDR system may include an antenna controller capable of managing dynamic power distribution according to the compound TRANSEC encryption keys as well as directionality shifts and beamforming operations to evade jammers detected within the 5G network environment.