Patent classifications
H04K3/226
Systems and methods for distributed P25 LMR radio vulnerability management and real-time interference monitoring
A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25 network. The system further includes a server coupled to the sensors and configured to receive the collected data from the plurality of sensors, compare the collected data with previously stored historical data to determine whether an anomaly exists within data patterns of the collected data, responsive to determining that the anomaly exists, determine at least one of: whether use of a cloned radio that mimics an authorized connection occurs, whether jamming of a radio frequency (RF) communication occurs, or whether jamming of a voice communication occurs within the P25 network by comparing the collected data with preset thresholds, and send a real-time alert to a dispatch and control console unit coupled to the server and the P25 network in response to determining that some of the collected data exceeds at least one of the preset thresholds, such that the dispatch and control console unit provides one or more corrective actions to the P25 network.
SYSTEMS AND METHODS FOR DETECTING WIRELESS COMMUNICATION JAMMING IN A NETWORK
An electronic device may include a processor and a network interface that may include a first radio and a second radio. The processor may be configured to perform wireless communication jamming attack detection by occasionally performing clear channel verification utilizing the network interface to determine whether a threshold number of devices' channels are incapacitated in a wireless network within a threshold amount of time and/or by sending a heartbeat signal from the first radio and determining whether the second radio received the heartbeat signal.
Electromagnetic interference control method and related product
Disclosed are an electromagnetic interference control method and a related product. The method is for an electronic device including an antenna and a camera. The method includes: obtaining a first operating frequency of the camera and a second operating frequency of the antenna; determining the second operating frequency is interfered; in response to the second operating frequency being interfered, obtaining a target frame rate range; determining an operating frequency of the camera corresponding to each frame rate in the target frame rate range; obtaining an operating frequency list; determining at least one third operating frequency from the operating frequency list; and selecting one third operating frequency from the at least one third operating frequency as a first target operating frequency; determining a first target frame rate; operating the camera at the first target operating frequency; and performing the video function based on the first target frame rate.
Display control method and related products
Provided are a display control method and related products. The method includes: obtaining a target operating frequency of a modem in response to detecting that a target game initiates a game booster mode; obtaining a first MIPI operating frequency of a display MIPI bus; obtaining a target game frame rate of the target game in response to detecting the target operating frequency is interfered based on the first MIPI operating frequency; determining a target MIPI operating frequency range list corresponding to the target game frame rate; determining a second MIPI operating frequency having least interference on the target operating frequency of the modem from the plurality of MIPI operating frequencies in the target MIPI operating frequency range list; and adjusting a MIPI operating frequency of the display MIPI bus to the second MIPI operating frequency.
Virtual sensing via sensor sharing for C-V2X scheduling
A configuration for virtual sensing via sensor sharing for C-V2X scheduling. The apparatus receives, from a first wireless device, a message indicating a threat entity within a threat zone. The threat entity transmits data that interferes with transmission of BSMs. The apparatus determines a candidate resource of a set of candidate resources on which to transmit a BSM based at least in part on the message indicating information related to the threat entity from the first wireless device. The apparatus transmits, to at least a third wireless device, the BSM on a determined candidate resource.
Compound transmission security (TRANSEC) for military-grade fifth generation (5G) radio systems
A multi-user (MU) multiple-input/multiple-output (MU MIMO) module for a fifth-generation (5G) software-defined radio (SDR) network environment is disclosed. In embodiments, the MU MIMO module of a transmitting SDR system of a 5G mobile ad hoc network (MANET) or other peer-to-peer directional network receives feedback from a receiving SDR system based on a prior or current frame and generates, based on the feedback, a compound transmission security (TRANSEC) encryption key for a subsequent frame. The compound TRANSEC encryption key encrypts the transmission of the subsequent frame through a combination of frequency-hopping encryption codes, orthogonality-hopping encryption codes, and dynamic pseudorandom distribution of transmitting power among antenna elements to simulate multipath hopping. The SDR system may include an antenna controller capable of managing dynamic power distribution according to the compound TRANSEC encryption keys as well as directionality shifts and beamforming operations to evade jammers detected within the 5G network environment.
Radio Frequency Jamming or Interference Detection and Mitigation in an Electronic Monitoring System
An electronic monitoring system and method are provided. The electronic monitoring system monitors communication of data between a device primary radio of a monitoring device and a hub primary radio through a primary communication path. Communication of the data is transferred to a secondary communication path between a device secondary radio of the monitoring device and a hub secondary radio in response to the detection of a disruption on the primary communication path resulting from interference or jamming of communications over the primary communication path. The primary and secondary radios operate a different frequencies.
VIRTUAL SENSING VIA SENSOR SHARING FOR C-V2X SCHEDULING
A configuration for virtual sensing via sensor sharing for C-V2X scheduling. The apparatus receives, from a first wireless device, a message indicating a threat entity within a threat zone. The threat entity transmits data that interferes with transmission of BSMs. The apparatus determines a candidate resource of a set of candidate resources on which to transmit a BSM based at least in part on the message indicating information related to the threat entity from the first wireless device. The apparatus transmits, to at least a third wireless device, the BSM on a determined candidate resource.
Ensuring transmissions are completed in a wireless network
A method comprising determining that interference may occur in a wireless network an apparatus is connected to, obtaining a first link that is of a first type, obtaining a second link that is of a second type, determining data to be transmitted from the apparatus to another apparatus connected to the wireless network, determining that a transmission occurs in the first link and transmitting the data in the second link, wherein the transmission in the first link has a longer duration than transmitting the data in the second link and the transmission in the first link and transmitting the data in the second link overlap in time.
System and method for triggering an alarm during a sensor jamming attack
Methods, systems, and apparatus, including computer programs encoded on a storage device, for triggering an alarm during a sensor jamming attack. In one aspect, a monitoring system sensor unit is disclosed that includes a sensor, a communication unit configured to communicate with a monitoring system using a range of frequencies, and a jamming detection unit. The jamming detection unit may include a processor and a computer storage media storing instructions that, when executed by the processor, cause the processor to perform operations. The operations include detecting a sensor jamming event, selecting a different form of communication other than the range of radio frequencies for the communication unit to communicate with the monitoring system, and providing, to the communication unit, an instruction to communicate with the monitoring system using the form of communication, wherein the communication unit may communicate, to the monitoring system using the form of communication, the sensor data.