Abstract:
Die Erfindung betrifft ein Verfahren für die Maskierung von Schall, eine Steuerungseinrichtung und ein Maskierungssystem für die Durchführung des Verfahrens. Erfindungsgemäß werden mehrere Bereiche in einem Raum im Grundzustand voneinander unabhängig leise zwecks Maskierung beschallt. Das Maskierungssystem umfasst daher Mittel, um Bereiche in einem Raum unabhängig voneinander beschallen zu können. Das Maskierungssystem umfasst ferner Mittel, mit denen in einem Bereich erzeugter Schall registriert und vorzugsweise auch analysiert werden kann. In Abhängigkeit von der Schallmessung bzw. Schallregistrierung und - soweit vorgesehen auch in Abhängigkeit von dem Ergebnis der Analyse des gemessenen externen Schalls - wird die maskierende Beschallung des Bereichs, in dem der externe Schall erzeugt worden ist, reduziert und/ oder die maskierende Beschallung der anderen Bereiche verstärkt. Insgesamt gelingt es so, die Lautstärke von maskierendem Schall im Vergleich zu vorbekanntem Stand der Technik klein zu halten und dennoch sehr zuverlässig in gewünschter Weise zu maskieren.
Abstract:
Methods of determining whether a jamming signal strength is adequate, comprising receiving a signal, determining first and second noise power levels of the signal in first and second ranges of frequencies, the first range being broader than and encompassing the second range, and calculating a ratio of the second noise power level divided by the first noise power level. Also, methods of determining whether a jamming signal strength is adequate, comprising receiving a signal, determining a phase difference between first and second frequency range phases of the signal, and calculating a statistical mean and/or a standard deviation of the phase difference. Also, systems for determining whether a jamming signal is adequate, computer-readable media for determining whether jamming signal strength is adequate, systems comprising means for transmitting a jamming signal, and systems comprising means for transmitting and receiving waveforms to users in the presence of protective jamming.
Abstract:
A sound masking system and method for providing sound masking in networked workstations or offices. The sound masking system comprises a communication network, a plurality of sound masking devices adapted to emit a sound masking signal, and a remote controller. One or more of the sound masking devices includes a controller, and the controller includes an interface for receiving information from the communication network and a component for controlling or adjusting output characteristics associated with the sound masking signal, such as volume. The controller includes a component responsive to a user input for setting or varying output characteristics associated with the sound masking signal.
Abstract:
Techniques for causing a wireless device in some prescribed operational area to respond on demand to a suitably designed interrogator and thereby expose its presence and identifying information while minimizing the required power and collateral interference outside of the predefined operational area. Having established the presence of the wireless device, the interrogator can subsequently establish it as friend or foe and proceed to either quarantine, disable, filter for access or elicit continuous transmission from the device for purposes of location while allowing friendly devices to continue to function normally in the same operational area or similarly prevent said friendly devices from becoming the source of constant false alarms. The methods described herein can be extended to interrogating a wireless device to discover its location, the encryption keys it is using, or interrogating the network to discover the actual dialing number of the wireless device.
Abstract:
Monitoring for unauthorized RF energy emitted or transmitted in a particular zone or portion of a building, etc. Radio frequency energy is received in a region that encompasses a zone in which it is desired to monitor for unauthorized radio frequency energy. At least one characteristic of the received radio frequency energy is analyzed to determine whether unauthorized radio frequency energy is occurring in the zone. Unauthorized RF energy may be detected by analyzing at least one spectral characteristic of the received radio frequency energy and comparing the at least one spectral characteristic with data associated with authorized and/or unauthorized radio frequency energy. Alternatively, signal classification techniques can be applied to data derived from the received radio frequency energy to classify by type signals contained in the received radio frequency energy. Certain signal types may be designated as unauthorized in a particular restricted zone and the results of the signal classification analysis is compared with data for authorized and/or unauthorized signal types.
Abstract:
A high-directivity transponder system uses a dual system of a retrodirective array transmitting a data signal peak toward an interrogator source, and a self-null-steering array transmitting a null toward the interrogator source and a jamming signal elsewhere, resulting in high S/N reception at the interrogator source and avoidance of interception. Integrating modulators would allow each array to transmit different data while the spectra of the transmitted signals are identical, thus disabling interception. The system enables secure point-to-point communications and can be used for short-distance wireless data transmission systems such as wireless LAN and RFID servers. As another aspect, self-steering signal transmission is employed for randomly oriented satellites using circularly polarized, two-dimensional retrodirective arrays. Quadruple subharmonic mixing is used as an effective means of achieving phase conjugation when a high-frequency LO is not feasible or inapplicable. These features may be used for small-satellite communications, secure tactical communications, search and rescue, enemy location fixing and tracking, UAV command and control, forest fire detection, marine-based tracking, and many other applications requiring secure communications with high signal directivity.
Abstract:
A call suppressor of a portable telephone in a cellular mobile telephone system involves a problem that the suppressor needs to be easily adaptive to the frequency of the transmitted radio wave different with company of the system, a problem that an effective area of call suppression needs to be set minutely with high accuracy, and a problem that degradation of the suppression effect due to the scanning speed limit needs to be overcome. In order to solve the problems, a PN generator for generating a signal the spectrum of which is spread over a wide frequency range, a digital filter for sharpening the frequency cut-off characteristic, a mixer circuit for mixing the signal with an RF carrier frequency to spread the spectrum, a high frequency generating circuit for generating a high frequency carrier, a selecting circuit for selecting a frequency, an FM modulation circuit for enhancing the suppression effect as required, a power amplifier for amplifying power high enough to transmit from an antenna, an antenna, and a power supply are provided and connected. A function of causing interference with frequencies including the one of the control channel used by the cellular mobile telephone system within a range of a specified place, a function of controlling the transmission frequency and power of the interference radio wave, and a function of varying the transmitting power are used.
Abstract:
The object of the call masking system for mobile telephones is to prevent the operation of mobile telephones which are present in a close environment without interfering with the normal operation of other telephones which are outside the closed environment. To this effect, the system generates interference signals which will prevent the mobile telephones from receiving the signalling channels sent by the base stations (for example GSM call signalling channel). The system monitors the power with which the carriers of the neighbouring base stations are received inside the room and will adjust the interference power radiating in the signalling channels so that the carrier/interference signal ratio will make the operation of the mobile telephones impossible. The system can be applied to closed environments wherein mobile telephones should not ring when receiving a call.
Abstract:
The invention concerns an apparatus for neutralising radiotelephones, in areas to be protected, by jamming call signals or modifying communication signals. The various embodiments of the apparatus are adapted to limit the volume to be filtered and to select the communications to be filtered.
Abstract:
Each subscriber module circuit comprises a plurality of latches (322) each of which is associated with one of a plurality of digital to analog converters (324). Each of the digital to analog converters (324) drives one or more frequency agile oscillators (326) with its analog output to generate the jamming signals. The subscriber module is based on a sequential state machine which loads frequency control words corresponding to the jammed channels from a frequency control memory (320) into each latch (322) on a cyclic basis. In this manner, the jamming signals generated by each latch (322), digital to analog converter (324), and oscillator (326) combination can be varied easily and quickly by a memory to memory transfer and be sustained between frequency hops without any change in frequency. The circuitry lends itself easily to large scale integration and miniaturization while eliminating the need to refresh the circuit to prevent frequency change because of voltage drop.