Patent classifications
H04K2203/36
Mitigation of spoofer satellite signals
A technology is described for mitigating global positioning system (GPS) spoofer signals. A potentially spoofed GPS signal received via an antenna coupled to a GPS receiver can be identified. The potentially spoofed GPS signal can be applied to a spoofer signal nulling loop to generate a set of spoofer nulling weights. The set of spoofer nulling weights can produce a direction vector associated with the potentially spoofed GPS signal. The direction vector can be compared to a beamsteering vector. The potentially spoofed GPS signal can be determined as being a spoofer GPS signal when a misalignment between the direction vector and the beamsteering vector is above a defined threshold. The spoofer GPS signal can be converted to a spoofer mitigation signal that is applied to satellite track channels of the GPS receiver. The spoofer mitigation signal can produce a spatial null in a direction of the spoofer GPS signal.
Systems and methods for frequency hopping waveforms
Systems and methods for reprogramming a Single Channel Ground and Airborne Radio System (SINCGARS) having a SINCGARS frequency-hopping waveform with a fixed retuning period operable in a network of SINCGARS. A system includes a controller programmed with a modified frequency-hopping waveform having one or more retuning periods, each of the one or more retuning periods being shorter in duration than the fixed retuning period of the conventional SINCGARS waveform, the modified frequency-hopping waveform compatible with each of the SINCGARS in the network. An interface is provided for programming each of the devices with the modified waveform.
Sound masking in open-plan spaces using natural sounds
A system, method and program product for generating sound masking in an open-plan space. A method is disclosed that includes: establishing a set of acoustic criteria for the space that specifies minimum output levels at a set of specified frequencies; mixing sound samples to create an audio output stream for use as sound masking when broadcast over at least one speaker using a power amplifier; and processing the audio output stream, wherein the processing includes: analyzing the audio output stream with a spectrum analyzer to determine if the minimum output levels at the set of specified frequencies are met; and level adjusting the audio output stream with an equalizer to ensure that minimum output levels at the set of specified frequencies are met but do not exceed a given threshold above the minimum level.
Barrage jammer with contoured amplitude
The present invention is a barrage jammer with contoured amplitude and an associated method for barrage jamming with contoured amplitude. In a standard prior art barrage jammer, the amplitude of the RF signal is independent from the ambient spectral environment. Alternatively, in a barrage jammer according to the current invention, the ambient spectral environment is detected, processed, and a contoured amplitude plan is developed based on the ambient environmental spectrum data. The barrage jammer transmit signal is transmitted in accordance with the contour amplitude plan. The invention is particularly useful when deployed in a Managed Access Service (MAS) system or as a jamming system. In particular, such a system can be used in a facility (such as a prison, school, government building, etc) to prevent cellphone usage.
Apparatus and method for physical layer security commuication in wireless communication system
An operation method of a terminal in a wireless communication system includes: transmitting uplink (UL) traffic information indicating a size of a UL data signal to a base station; receiving a jamming message generated based on the UL traffic information from the base station; generating an uplink (UL) transmission signal including the UL data signal and a UL jamming signal based on the jamming message; and transmitting the UL transmission signal to the base station. Also, the jamming message indicates a pattern of the UL jamming signal, the UL transmission signal is transmitted in a same frequency band as a frequency band in which a downlink (DL) transmission signal of the base station is received, and the UL jamming signal is transmitted in remaining resources excluding resources occupied by the UL data signal in the frequency band.
METHOD AND APPARATUS FOR PHYSICAL LAYER SECURITY COMMUNICATION IN WIRELESS COMMUNICATION SYSTEM
An operation method of a terminal in a wireless communication system includes receiving a preamble sequence from a base station; estimating a UL channel between the terminal and the base station based on the preamble sequence; determining a first frequency region for transmitting a data signal and a second frequency region for transmitting a jamming signal in an entire frequency region of the UL channel based on a result of estimating the UL channel; and transmitting to the base station a UL control signal including identification information for identifying the first frequency region and the second frequency region.
Selecting a precoding configuration based on self-jamming metrics
A method for wireless communication by a wireless communication device is described. The wireless communication device determines that an aggressor radio in the wireless communication device is causing (or can potentially cause) self-jamming to a victim radio in the wireless communication device. A precoding configuration is selected based on one or more link throughput metrics and one or more self-jamming metrics. The precoding configuration is applied to transmissions of the aggressor radio.
SYSTEM AND METHOD FOR INTERCEPTING UNMANNED AERIAL VEHICLES
The invention provides a system and method for intercepting a target UAV by releasing a plurality of countermeasure (CM) objects in a projected path thereof to form a 3D countermeasure cloud. Pieces of flexible materials configured to become ensnared in the propellers of the target UAV or otherwise interfere with their ability to provide lift and thrust capabilities to the UAV. A UAV interception control system may track the target UAV and compute a location probability volume therefor using a modified Kalman filter to decide on a projected interception location and time.
SYSTEM AND METHOD FOR COMMUNICATING WITH A UAV
A method and system for communicating with an unmanned aerial vehicle (UAV) over a cellular network. The UAV need not be the same type or model and may have different communications protocols. A coded message transmitted over the cellular network is received at the UAV, decoded and retransmitted to the UAV using its native communications protocol.
Detecting of navigation data spoofing based on signal strength variance
Techniques for determining whether data associated with an autonomous/non-autonomous operation of a manned/unmanned vehicle may be trusted. For example, a first set of data may be provided from a source external to a manned/unmanned vehicle. A second set of data may be accessed. This second set may be provided from a source internal or external to the manned/unmanned vehicle and may be associated with the same autonomous/non-autonomous operation. The two sets may be compared to determine whether the first set of data may be trusted or not. If untrusted, a corrective action may be performed.