GPS Spoofing Detection Techniques
First Claim
1. A method comprising:
- providing a plurality of anti-spoofing techniques, wherein the plurality of anti-spoofing techniques detect interference with data provided by one or more navigation devices for a plurality of threat situations;
analyzing positioning, timing and frequency characteristics associated with the one or more navigation devices in order to identify a threat situation among the plurality of threat situations; and
executing one or more of the anti-spoofing techniques based on the identified threat situation, wherein multiple anti-spoofing techniques can be executed substantially in parallel.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein are system, method, and computer program product embodiments for detecting spoofing of a navigation device. A plurality of anti-spoofing techniques are provided. The plurality of anti-spoofing techniques detect interference with data provided by one or more navigation devices for a plurality of threat situations. Positioning, timing and frequency characteristics associated with the one or more navigation devices are analyzed in order to identify a threat situation among the plurality of threat situations. Based on the identified threat situation one or more of the anti-spoofing techniques are executed. The one or more anti-spoofing techniques can be executed in parallel in order to provide various anti-spoofing detection techniques at the same time.
-
Citations
30 Claims
-
1. A method comprising:
-
providing a plurality of anti-spoofing techniques, wherein the plurality of anti-spoofing techniques detect interference with data provided by one or more navigation devices for a plurality of threat situations; analyzing positioning, timing and frequency characteristics associated with the one or more navigation devices in order to identify a threat situation among the plurality of threat situations; and executing one or more of the anti-spoofing techniques based on the identified threat situation, wherein multiple anti-spoofing techniques can be executed substantially in parallel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
a memory; and at least one processor coupled to the memory and configured to; provide a plurality of anti-spoofing techniques, wherein the plurality of anti-spoofing techniques detect interference with data provided by one or more navigation devices for a plurality of threat situations; analyze positioning, timing and frequency characteristics associated with the one or more navigation devices in order to identify a threat situation among the plurality of threat situations; and execute one or more of the anti-spoofing techniques based on the identified threat situation, wherein multiple anti-spoofing techniques are executed substantially in parallel. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A tangible computer-readable device having instructions stored thereon that, when executed by at least one computing device, causes the at least one computing device to perform operations comprising:
-
providing a plurality of anti-spoofing techniques, wherein the plurality of anti-spoofing techniques detect interference with data provided by one or more navigation devices for a plurality of threat situations; analyzing positioning, timing and frequency characteristics associated with the one or more navigation devices in order to identify a threat situation among the plurality of threat situations; and executing one or more of the anti-spoofing techniques based on the identified threat situation, wherein multiple anti-spoofing techniques are executed substantially in parallel.
-
-
24. A method, comprising:
-
processing a set of first data accessed from a validated source at different intervals of time; processing a set of second data accessed from an unvalidated source, wherein the validated source is independent of the unvalidated source; determining a threat detection value based on averaging the set of first data and averaging the set of second data during an adjustable interval of time; and when the threat detection value meets a configurable threat detection threshold, generating a threat alert message, wherein the threat alert message identifies an anomaly in either the validated source or the unvalidated source. - View Dependent Claims (25)
-
-
26. A system, comprising:
-
a memory; and at least one processor coupled to the memory and configured to; process a set of first data accessed from a validated source at different intervals of time; process a set of second data accessed from an unvalidated source, wherein the validated source is independent of the unvalidated source; determine a threat detection value based on averaging the set of first data and averaging the set of second data during an adjustable interval of time; and when the threat detection value meets a configurable threat detection threshold, generate a threat alert message, wherein the threat alert message identifies an anomaly in either the validated source or the unvalidated source. - View Dependent Claims (27)
-
-
28. A method, comprising:
-
receiving a first set of data associated with a first navigation device; receiving a second set of data associated with a second navigation device; processing the first set of data and the second set of data to determine a first reported position for the first navigation device and a second reported position for the second navigation device; comparing the first reported position with the second reported position; generating a first threat alert when a difference between the first reported position and the second reported position is below a position threshold; processing a set of third data accessed from a validated source at different intervals of time, wherein the validated source operates independently of the first navigation device and the second navigation device; determining a threat detection value based on averaging the set of first data, averaging the set of second data, and averaging the set of third data during an adjustable time range; and generating a second threat alert when the threat detection value meets a configurable threat detection threshold, wherein the first threat alert and second threat alert are indicative of an anomaly in at least one of the first navigation device, the second navigation device, and the validated source. - View Dependent Claims (29)
-
-
30. A method, comprising:
-
receiving a first set of data associated with a first mobile device; receiving a second set of data associated with a second mobile device; processing the first set of data and the second set of data to determine a first reported position associated with the first mobile device and a second reported position associated with the second mobile device; performing a stationary positioning check and a dual positioning check for the first mobile device and the second mobile device based on the respective processed sets of data, wherein the stationary positioning check and the dual positioning check are performed in parallel; and generating at least one threat alert when one or more threat detection values meet a configurable distance threshold.
-
Specification