A time server or even the GNSS receiver must be protected against a GNSS threat.
How It Works
Install the GP-Probe on your GNSS-dependent infrastructure, for example, near the time server. Learn more
Use the GP-Divider to share one antenna with the GP-Probe and the GNSS receiver
The GP-Blocker will disconnect the antenna port in case of spoofing/jamming or low signal quality. Learn more
PPS Phase Accuracy Measurement
For advanced time server protection, the GP-Probe can measure the difference between internal and external PPS. Learn more
Remote Control Link
The GP-Probe can control all types of connected equipment via remote interface: RS232, Telnet or SNMP. Learn more
Three GNSS antennas
To guarantee uncompromised detection of any advanced spoofing attacks, GP-Probe uses three-spaced antennas. Learn more
The GP-Probe transmits raw data to the GP-Cloud for real-time processing via an embedded 3G/4G modem or Ethernet.
With cutting-edge Machine Learning Techniques for anomalies detection and classification, the GP-Cloud analyzes data from the GP-Probe in real-time. Learn more
WEB User Interface
Monitor the entire GNSS-dependent critical infrastructure in a single web-interface.
Synchronization Management System
The powerful GP-Cloud API and other tools allow the solution to be integrated into existing Synchronization Management Systems. Learn More
Businesses That Rely on Our Engineering Talents
Based on MiFID II and SEC 613 regulation, financial service firms in Europe and the US must comply …
GPSPATRON helps to obtain the mandatory precision from GNSS in difficult jamming conditions, an inferior GNSS antenna placement, and even under spoofing ...
Data centers require sub-millisecond precision timestamping ...
Digital broadcasting in Single Frequency Networks (SFN) mode like DVB-T/T2, T-DMB, DAB, or DRM requires ...
According to ICAO Annex 10 requirements, airports need to implement ...
GNSS is currently applied to diverse marine applications such as navigation, seafloor mapping ...
GNSS is utilized to track trains on low-density line networks. Automatic Train Control Systems use GNSS to ...
Dangerous Goods Transportation
Transportation of dangerous goods is one of the main security applications ...
Time synchronization distortion of a Phasor Measurement Units can lead to ...
GNSS RTK network is a critical part of many applications with precise, real-time positioning requirements ...
The success of autonomous machines requires uncompromised accuracy and reliability of the GNSS...
In telecom (3G, 4G, SATCOM, PMR, PSTN), GNSS is utilized for ...
GPSPATRON can be utilized for interference monitoring for GNSS bands ...
The armed forces actively use GNSS spoofing during exercises, operations, and to protect bases against drones ...
We are a team of enthusiastic developers who practice their long-standing technical expertise to achieve the highest possible customer satisfaction
“Joint experiments with GPSPATRON specialists allowed us to estimate vulnerabilities of time servers to intentional and non-intentional GPS spoofing, to obtain statistics on the quality of GNSS signals at antenna installation points. Research carried out with GPSPATRON will help us improve the architecture of our timing system, making it resistant to even the most complex, targeted attacks.”
Head of Hardware Support Department,
“We implement large-scale projects for time-critical infrastructure with many distributed nodes. GPSPATRON ensures high accuracy of time synchronization and monitoring, even in strong radio interference conditions.”
“GPSPATRON provides an excellent tool for GNSS signal quality analysis. With an embedded spoofing/jamming detection and classification algorithms, we could create a resilient synchronization system.”
Yes, sure. You can use GP-Divider. It is a two-way RF power divider with a 10 mA current simulation. The current simulation is needed for the time server with the antenna preamplifier current measurement.
In an asynchronous spoofing attack, the generated signal can differ from the original one in a variety of parameters like coordinates, time, etc. Synchronous spoofer generates a counterfeit signal that is identical to the genuine. Asynchronous attacks are easy to detect due to a sharp shift in the parameters. Synchronous attacks are much more difficult to execute but they allow attackers to unnoticeably shift time or coordinates. Learn more in our article.
It is not a requirement at all. You can connect PPS output of the time server to the PPS input of the GP-Probe and control the phase offset. It is an additional function of the system for controlling the health of the time server in real-time
Affirmative. The GP-Cloud can be supplied under different license types. Use it in the cloud or install it on your own servers.
Affirmative. It is necessary for the detection of intentional synchronous GNSS spoofing attacks. 3 spaced GNSS antennas find anomalies on the angle-of-arrival of satellites RF signals. Asynchronous spoofing detection algorithms require only one channel.
Jamming – noise generation. Spoofing – fake satellites signal generation. Jamming is simple to detect – the associated satellites disappear. Spoofing is extremely challenging to detect since the fake signals can have the same power, modulation, structure, pseudoranges, doppler. Jammers are not a big issue for time servers, because servers have internal local oscillator and can hold a phase and frequency for several days. Spoofers are the biggest issue for time servers, because they can move time.
To protect GNSS time servers we have developed the GP-Blocker. It is a threat blocker with an embedded noise generator. It can block even the most powerful RF signals. GP-Blocker is connected to the GP-Probe, and in case of spoofing or low signal quality, it can disconnect the antenna port of the protected time server.