Patent classifications
H04K1/02
Signal generation apparatus and signal generation method
An object of the present disclosure is to prevent an output level of an analog signal from exceeding a predetermined upper limit value, in a module that adjusts a level of the analog signal. According to the present disclosure, there is provided a signal generation apparatus including an RF base module (12) that converts a digital base band signal for testing into an intermediate frequency (IF) signal and outputs the IF signal, and a control unit (18), in which the RF base module is connected to an RF converter (20) which outputs an analog RF signal obtained by frequency-converting the IF signal, and the control unit clips the IF signal output from the RF base module based on an output level of the analog RF signal output from the RF converter.
Privacy device for smart speakers
Systems, apparatuses, and methods are described for a privacy blocking device configured to prevent receipt, by a listening device, of video and/or audio data until a trigger occurs. A blocker may be configured to prevent receipt of video and/or audio data by one or more microphones and/or one or more cameras of a listening device. The blocker may use the one or more microphones, the one or more cameras, and/or one or more second microphones and/or one or more second cameras to monitor for a trigger. The blocker may process the data. Upon detecting the trigger, the blocker may transmit data to the listening device. For example, the blocker may transmit all or a part of a spoken phrase to the listening device.
Information processing device
The present invention improves data transmission safety and data transfer rate, and reduces an increase in costs when doing so. A map management unit 141 manages a map which defines a prescribed rule for dividing pseudorandom number data into two. On the basis of the rule defined by the map, a division unit 142 generates data obtained by dividing the pseudorandom number data into two as vertically irregular mapping input data and horizontally irregular mapping input data. A vertically irregular mapping unit 151 generates data obtained by subjecting the vertically irregular mapping input data to irregular mapping processing as vertical base reference point data. A horizontally irregular mapping unit 152 generates data obtained by subjecting the horizontally irregular mapping input data to irregular mapping processing as horizontal base reference point data. A base reference point information generation unit 133 decides on one base on the basis of the vertical base reference point data and the horizontal base reference point data.
Low power, efficient doherty power amplifier
In one embodiment, an apparatus includes: a digital baseband circuit to receive a digital baseband signal and output a first digital baseband signal and a second digital baseband signal, the second digital baseband signal comprising a scaled version of the first digital baseband signal; a first transmitter signal path coupled to the digital baseband circuit to process the first digital baseband signal and output a first radio frequency (RF) signal; a second transmitter signal path coupled to the digital baseband circuit to process the second digital baseband signal and output a second RF signal; a first power amplifier coupled to the first transmitter signal path to amplify the first RF signal and output an amplified first RF signal; and a second power amplifier coupled to the second transmitter signal path to amplify the second RF signal and output an amplified second RF signal.
Transmitter, receiver and controlling method thereof
A transmitter includes: a frame generator configured to generate a frame including a frame starting symbol, at least one data symbol and a frame closing symbol; a pilot and reserved tone inserter configured to insert pilots and reserved tones in at least one of the frame starting symbol, the data symbol and the frame closing symbol such that positions of the reserved tones do not overlap positions of the pilots in the at least one of the frame starting symbol, the data symbol and the frame closing symbol; and a transmitter configured to transmit the frame in which the pilots and the reserved tones are inserted, wherein the reserved tones are not used to transmit data in the frame.
INTERRUPTING RECEIPT OF SENSITIVE INFORMATION
A method includes detecting an initial vocalization by a user in an environment including a primary device and a secondary device, analyzing the initial vocalization to determine whether a future vocalization is likely to contain sensitive information based on the initial vocalization where the future vocalization is a potential future vocalization, and controlling, based on determining that the future vocalization is likely to contain sensitive information, a speaker of the primary device to output a noise canceling signal configured to prevent the secondary device from detecting the future vocalization.
Optical communication system using mode-locked frequency comb and all-optical phase encoding for spectral and temporal encrypted and stealthy transmission, and for optical processing-gain applications
A method for transmitting data carrying optical information over an optical channel, comprising the steps of providing an optical transmitter consisting of a light source being a Mode-Locked Optical Frequency Comb (MLFC) for generating a frequency comb of multiple carriers, each of which being modulated by a baseband signal; an optical modulator for modulating each and all of the multiple carriers in a modulation bandwidth extending up to the modes' frequency spacing between the multiple carriers; performing all-optical encoding of the modulated carriers by manipulating the optical amplitude and/or phase and/or polarization of all optically modulated carriers; and transmitting, by the optical transmitter, the encoded modulated carriers to an optical receiver, over an optical channel.
Interrupting receipt of sensitive information
Systems and methods for interrupting disclosure of sensitive information are described. Sensitive information data associated with a user is maintained. A primary device detects commencement of a voice input to a secondary device. As the voice input is detected by the primary device, the voice input is analyzed to determine the content of the voice input. The content is compared to the sensitive information data to determine whether the voice input contains sensitive information. When the primary device determines the voice input contains sensitive information, a speaker of the primary device is controlled to generate a noise canceling signal which interrupts receipt of further sensitive information by the secondary device.
Methods and systems for access control
Aspects of the present disclosure include methods, apparatuses, and computer readable media for controlling access including generating a random string or pseudorandom string, acoustically broadcasting a beacon message comprising the random string or pseudorandom string, acoustically receiving, in response to acoustically broadcasting the beacon message, an authentication message comprising a user identification and an authentication string, obtaining a password associated with the user identification, computing a verification string using the password and the random string or pseudorandom string, verifying the authentication string in the authentication message using the verification string, and transmitting, in response to successfully verifying the authentication string in the authentication message, an unlocking message to the access controlled point to unlock the access controlled point.
Methods and systems for access control
Aspects of the present disclosure include methods, apparatuses, and computer readable media for controlling access including generating a random string or pseudorandom string, acoustically broadcasting a beacon message comprising the random string or pseudorandom string, acoustically receiving, in response to acoustically broadcasting the beacon message, an authentication message comprising a user identification and an authentication string, obtaining a password associated with the user identification, computing a verification string using the password and the random string or pseudorandom string, verifying the authentication string in the authentication message using the verification string, and transmitting, in response to successfully verifying the authentication string in the authentication message, an unlocking message to the access controlled point to unlock the access controlled point.