Patent classifications
H04K1/04
Masking Open Space Noise Using Sound and Corresponding Visual
Methods and apparatuses for addressing open space noise are disclosed. In one example, a method for masking open space noise includes outputting from a speaker a speaker sound corresponding to a flow of water, and displaying a water element system, the water element system generating a sound of flowing water.
Robust code / data hiding method against analog transmission (over the air) for digital audio
The present invention is relates a robust code/data hiding method against analog transmission (over the air) for digital audio, secret code/data hiding component to digital audio file and extracting the hidden code/data from the covered sound, which a digital audio where a secret code/data is embedded is played from the loudspeakers in any environment and media player, the digital audio is received by the user mobile phone or mobile device microphone without being affected by the distorting effects of the analog transmission medium and the noise in any way, enabling follow-up information based on user interaction and user product experience. The present invention can be used in many areas such as the participation of users in a campaign via mobile phone, increasing the TV/radio viewing rate (rating) & follow-ups, copyright tracking & management, participating in sweepstakes, distributing instant coupons, authentication and delivering advertisements to target customer groups.
Robust code / data hiding method against analog transmission (over the air) for digital audio
The present invention is relates a robust code/data hiding method against analog transmission (over the air) for digital audio, secret code/data hiding component to digital audio file and extracting the hidden code/data from the covered sound, which a digital audio where a secret code/data is embedded is played from the loudspeakers in any environment and media player, the digital audio is received by the user mobile phone or mobile device microphone without being affected by the distorting effects of the analog transmission medium and the noise in any way, enabling follow-up information based on user interaction and user product experience. The present invention can be used in many areas such as the participation of users in a campaign via mobile phone, increasing the TV/radio viewing rate (rating) & follow-ups, copyright tracking & management, participating in sweepstakes, distributing instant coupons, authentication and delivering advertisements to target customer groups.
System and Method for Secure Processing of Speech Signals using Pseudo-speech Representations
A method, computer program product, and computing system for processing a speech signal. A sensitive portion of the speech signal is identified. A pseudo-speech representation of the sensitive portion is generated using a voice converter system. Speech processing is performed on the speech signal and the pseudo-speech representation of the sensitive portion using a speech processing system.
Intrusion Detection and Radio Fingerprint Tracking
A radio transmitter adjusts the spectral, amplitude, and/or phase characteristics of its transmissions to defeat radio fingerprinting identification without destroying the content of the transmissions. The transmitter determines a threshold of signal distortion that impedes RF fingerprint identification while providing an acceptable amount of degradation to data transmissions and then synthesizes a distortion of its unique RF fingerprint to impede identification. The transmitter may create RF fingerprint personalities to be paired with different radio protocol behaviors and subscriber terminal identification codes (e.g., MAC addresses or SMSIs) for generating different radio identities.
Intrusion detection and radio fingerprint tracking
A transmitter is configured to change its unique radio signature enough to defeat radio fingerprinting identification without destroying the content of the transmissions. The transmitter may be configured for defeating both transient-signal fingerprinting and steady-state fingerprinting. The transmitter may be configured to obfuscate transient detection. The transmitter may continuously vary spectral, amplitude, and/or phase characteristics of its transmissions to defeat radio fingerprinting. The transmitter may pair radio fingerprints with subscriber terminal identification codes (e.g., MAC addresses or SMSIs) for generating different radio identities. The transmitter may measure another transmitter's radio fingerprint, and, compensating for its own radio fingerprint, spoof the measured radio fingerprint.
Cooperative Intrusion Detection
A network node in a distributed network comprises a surface immunoglobulin system configured to monitor other nodes in the distributed network and generate an alert upon detecting a suspicious activity; and a free-antibody system configured to push a free-antibody program to a requesting node petitioning to access the distributed network. The free-antibody program can comprise a software agent configured to communicatively couple to the surface immunoglobulin system while monitoring behavior of the requesting node. The free-antibody program reports detected malware and/or suspicious activity to the surface immunoglobulin system, which can enact countermeasures against the requesting node.
Signal modification for control channel physical layer security
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a transmitter device may modify, based at least in part on a secrecy key, an input or an output of at least one of binary scrambling, modulation, or orthogonal frequency division multiplexing (OFDM) tone mapping for a physical control channel signal, resulting in a secured physical control channel signal. The transmitter device may transmit, to a receiver device, the secured physical control channel signal. Numerous other aspects are described.
Apparatus and method for generating jamming signal, communication system
This application relates to an apparatus and method for generating a jamming signal, and a communication system. In one aspect, the method may include converting binary bits of a first communication signal to be transmitted and obtaining at least one codeword matched previously to the binary bits. The method may also include generating a second communication signal by superimposing a first conversion signal being obtained by converting the first communication signal to an up-chirp signal and a second conversion signal being obtained by converting the first communication signal to a down-chirp signal. The method further include generating a pseudo jamming signal by computing the second communication signal and the codeword.
Apparatus and method for generating jamming signal, communication system
This application relates to an apparatus and method for generating a jamming signal, and a communication system. In one aspect, the method may include converting binary bits of a first communication signal to be transmitted and obtaining at least one codeword matched previously to the binary bits. The method may also include generating a second communication signal by superimposing a first conversion signal being obtained by converting the first communication signal to an up-chirp signal and a second conversion signal being obtained by converting the first communication signal to a down-chirp signal. The method further include generating a pseudo jamming signal by computing the second communication signal and the codeword.