Patent classifications
H04K3/65
APPARATUS AND METHOD OR FILTERING ADVERTISEMENTS IN WIRELESS NETWORKS
The present invention relates to an apparatus and method for filtering advertisements of a target device by using friendly jamming with a beamforming antenna to jam at least one advertisement channel in at least one specific sector of non-target devices. Thus, a master device can easily discover the advertisement of the target device in order to successfully connect to the target device. In addition, since the jamming is performed on advertisement channels only, data connection channels are not disturbed.
IDENTIFYING, TRACKING, AND DISRUPTING UNMANNED AERIAL VEHICLES
Systems, methods, and apparatus for identifying, tracking, and disrupting UAVs are described herein. A tracking system can receive sensor data associated with an object in a particular airspace from one or more radio frequency sensors. The tracking system can analyze the sensor data relating to the object to identify a type of RF signal being used by the object. A portable countermeasure device can generate one or more disruption signals on one or more targeted bands of spectrum based on the type of RF signal being used by the object.
Systems and methods for distributed P25 LMR radio vulnerability management and real-time interference monitoring
A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25 network. The system further includes a server coupled to the sensors and configured to receive the collected data from the plurality of sensors, compare the collected data with previously stored historical data to determine whether an anomaly exists within data patterns of the collected data, responsive to determining that the anomaly exists, determine at least one of: whether use of a cloned radio that mimics an authorized connection occurs, whether jamming of a radio frequency (RF) communication occurs, or whether jamming of a voice communication occurs within the P25 network by comparing the collected data with preset thresholds, and send a real-time alert to a dispatch and control console unit coupled to the server and the P25 network in response to determining that some of the collected data exceeds at least one of the preset thresholds, such that the dispatch and control console unit provides one or more corrective actions to the P25 network.
METHOD AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR NETWORK SECURITY
A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an identifier of the encryption key and transmits the encrypted broadcast message over a broadcast channel. A method for decrypting a broadcast message that is encrypted is also disclosed.
MULTI-PLATFORM LOCATION DECEPTION SYSTEM
Systems and methods for providing a synthetic track to observation devices are provided. In one embodiment, a method can include determining a location range and a time range for a synthetic track to be created by a plurality of platforms. The method can further include determining an emission location and an emission time for each of the platforms of the plurality of platforms based, at least in part, on the location range and the time range. The method can include sending a set of data to each of the plurality of platforms, each respective set of data indicating the emission location and the emission time at which the respective platform is to generate the emission to create the synthetic track.
MULTI-PLATFORM LOCATION DECEPTION DETECTION SYSTEM
Systems and methods for identifying a synthetic track are provided. In one embodiment, a method can include receiving, by one or more computing devices, a plurality of emissions from one or more platforms. The emissions can be generated in an emission sequence and are generated to create a track indicative of an object travel path. The method can further include determining, by the one or more computing devices, whether an irregularity associated with the track exists based at least in part on one or more of the emissions. The method can include rejecting, by the one or more computing devices, the track as an actual object travel path when it is determined that the irregularity associated with the track exists.
Privacy device for smart speakers
Systems, apparatuses, and methods are described for a privacy blocking device configured to prevent receipt, by a listening device, of video and/or audio data until a trigger occurs. A blocker may be configured to prevent receipt of video and/or audio data by one or more microphones and/or one or more cameras of a listening device. The blocker may use the one or more microphones, the one or more cameras, and/or one or more second microphones and/or one or more second cameras to monitor for a trigger. The blocker may process the data. Upon detecting the trigger, the blocker may transmit data to the listening device. For example, the blocker may transmit all or a part of a spoken phrase to the listening device.
Detection of replay attack
In order to detect a replay attack in a speaker recognition system, at least one feature is identified in a detected magnetic field. It is then determined whether the at least one identified feature of the detected magnetic field is indicative of playback of speech through a loudspeaker. If so, it is determined that a replay attack may have taken place.
DETECTION OF GNSS INTERFERENCE USING SURVEILLANCE MESSAGES
In some examples, a system includes a transceiver configured to receive surveillance messages from Y target vehicles, where Y is an integer greater than two. The system includes processing circuitry configured to determine predicted positions of the Y target vehicles based on the surveillance messages. The processing circuitry is also configured to determine reported positions of the Y target vehicles based on later received surveillance messages. The processing circuitry is further configured to determine that respective differences between the respective predicted position and the respective reported position for X of the Y target vehicles is greater than a threshold distance. The processing circuitry is configured to determine that Global Navigation Satellite System interference has occurred in response to determining that X divided by Y is greater than a threshold level.
Operational disruption of vehicle containing GNSS receiver
Several examples of a navigation disruption device and methods of using the same are described herein that use real-time, low-cost computation to generate conflicting/competing signals to actual Global Navigation Satellite System (GNSS) signals. For example, the novel, hand-held navigation disruption devices described herein (1) generate signals from a simulated satellite constellation, wherein the signals from the simulated satellite constellation conflict/compete with signals from one or more actual satellite constellations, and (2) transmit the signals from the simulated satellite constellation(s) towards an unmanned vehicle. The signals from the simulated satellite constellation(s) cause the unmanned vehicle to compute an incorrect position, which in turn disrupts its ability to navigate and operate effectively.