H04K3/222

Detection And Protection Against Jam Intercept And Replay Attacks
20180089918 · 2018-03-29 ·

Method and apparatus are disclosed for detection and protection against jam intercept and replay attacks. An example disclosed key fob includes a first wireless transceiver tuned to communicate via a first frequency band, second wireless transceiver tuned to communicate via a second frequency band, and a communicator. The first frequency band is different than the second frequency band. The example communicator sends a first message via the first wireless transceiver in response to activation of a first button. Additionally, the example communicator, in response to not receiving a second message via the second wireless transceiver, provides an alert.

Cooperative monitoring networks
09871692 · 2018-01-16 · ·

An electronic monitoring system is described that receives data from a particular monitoring system, receives data from multiple other monitoring systems, analyzes data received from the particular monitoring system irrespective of data received from the multiple other monitoring systems, based on the analysis, determines whether one or more events occur at the particular environment, and in response to determining that a particular event occurs at the particular environment, evaluates the particular event against a set of rules, selects, based on the evaluation results, a particular subset of the multiple other monitoring systems to serve as a cooperative monitoring network, assesses data received from the particular monitoring system with data received from the particular subset of the multiple other monitoring systems, based on the assessment, tracks, in connection with the particular event, events detected by the particular subset of the multiple other monitoring systems, and handles the particular event based on the tracked events detected by the particular subset of the multiple other monitoring systems.

Radio frequency jamming or interference detection and mitigation in an electronic monitoring system
12166572 · 2024-12-10 · ·

An electronic monitoring system and method are provided. The electronic monitoring system monitors communication of data between a device primary radio of a monitoring device and a hub primary radio through a primary communication path. Communication of the data is transferred to a secondary communication path between a device secondary radio of the monitoring device and a hub secondary radio in response to the detection of a disruption on the primary communication path resulting from interference or jamming of communications over the primary communication path. The primary and secondary radios operate a different frequencies.

Cooperative monitoring networks
12206545 · 2025-01-21 · ·

An electronic monitoring system is described that receives data from a particular monitoring system, receives data from multiple other monitoring systems, analyzes data received from the particular monitoring system irrespective of data received from the multiple other monitoring systems, based on the analysis determines whether one or more events occur at the particular environment, and in response to determining that a particular event occurs at the particular environment, evaluates the particular event against a set of rules, selects, based on the evaluation results, a particular subset of the multiple other monitoring systems to serve as a cooperative monitoring network, assesses data received from the particular subset of the multiple other monitoring systems, based on the assessment, tracks, in connection with the particular event, events detected by the particular subset of the multiple other monitoring systems, and handles the particular event based on the tracked events.

METHODS AND SYSTEMS FOR ENABLING END-USER EQUIPMENT AT AN END-USER PREMISE TO EFFECT COMMUNICATIONS WHEN AN ABILITY OF THE END-USER EQUIPMENT TO COMMUNICATE VIA A COMMUNICATION LINK CONNECTING THE END-USER EQUIPMENT TO A COMMUNICATIONS NETWORK IS DISRUPTED

A method for effecting communications, such as telephone calls, accesses to data network sites, alarm system communications, and/or other communications, over a communications network. The method comprises: determining that an ability of first end-user equipment at a first end-user premise to communicate via a first communication link connecting the first end-user equipment to the communications network is disrupted; establishing a wireless communication link between the first end-user equipment and second end-user equipment at a second end-user premise; and causing information transmitted by or destined for the first end-user equipment to be exchanged over the communications network via the wireless communication link and a second communication link connecting the second end-user equipment to the communications network. Also provided are apparatus and computer-readable media containing a program element executable by a computing system to perform such a method.

CAR THEFT PREVENTION USING LONG RANGE WIDE AREA NETWORK
20170197583 · 2017-07-13 ·

A method for monitoring a vehicle, the method may include detecting, by a vehicle monitor that is associated with a vehicle, a failure to communicate with a first communication network; storing failure information about a time of the failure and a location of the vehicle in proximity to a detection of the failure; attempting, after the detecting of the failure and by the vehicle monitor, to establish communication with at least one communication network out of the first communication network and a second communication network; wherein the second communication network is a long range wide area network (LoRaWAN) and the first communication network is not a LoRaWAN; and after succeeding to establish communication with a given communication network out of the first and second communication networks, transmitting the failure information over the given communication network.

Endpoint device antenna beam forming based jamming detection and mitigation

A method, computer-readable storage device and apparatus for locating a source of a communication impairment are disclosed. For example, the method detects the communication impairment, performs a sweep to locate a direction of the source of the communication impairment, wherein the sweep is performed in response to the detecting the communication impairment at the endpoint device, and generates a null in the direction of the source of the communication impairment.

Methods and systems for enabling end-user equipment at an end-user premise to effect communications when an ability of the end-user to communicate via a communication link connecting the end-user equipment to a communications network is disrupted

A method for effecting communications, such as telephone calls, accesses to data network sites, alarm system communications, and/or other communications, over a communications network. The method comprises: determining that an ability of first end-user equipment at a first end-user premise to communicate via a first communication link connecting the first end-user equipment to the communications network is disrupted; establishing a wireless communication link between the first end-user equipment and second end-user equipment at a second end-user premise; and causing information transmitted by or destined for the first end-user equipment to be exchanged over the communications network via the wireless communication link and a second communication link connecting the second end-user equipment to the communications network. Also provided are apparatus and computer-readable media containing a program element executable by a computing system to perform such a method.

Method, device and system for detecting a jamming transmitter
09614640 · 2017-04-04 · ·

A base station in a cellular radio network and user equipment assigned to a cell are linked by an air interface for communication on a respective communication channel in a communication band. The same communication band is common to at least one of the cells and to the user equipment on the respective communication channel of a cell. A jamming transmitter is detected by decoding a cell, by way of successful reading of control information of the cell, detecting a wideband power parameter representative of the communication band, and detecting a channel power parameter representative for a part of the communication band that is a communication channel. A narrowband jamming transmitter is indicated in the case that decoding of the cell failed, the wideband power parameter is not above a first threshold, and the channel power parameter is above a second threshold.

METHODS AND SYSTEMS FOR COLLABORATIVE GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) DIAGNOSTICS
20170070971 · 2017-03-09 ·

Disclosed are systems, methods and techniques for determining or inferring a status or fault for a portion or aspect of a global navigation satellite system (GNSS). For example, fault messages may be received from multiple mobile devices where fault messages provide indicators indicative of events or conditions. Fault indicators in received fault messages obtained from messages received from two or more of the mobile devices may be combined to infer a status or fault of at least a portion of a GNSS. Augmentation parameters conveying information related to an inferred fault may be transferred to a mobile device to improve GNSS location of the mobile device.