H04K1/04

APPLICATION OF KEY EXCHANGE BASED PHYSICAL LAYER SECURITY METHODS

A method making modifications during a key phase of physical layer security methods and enabling the physical layer security methods to be applicable in a wireless communication is provided. The method includes a step of generating a K common key, including steps to be carried out at a modulator during a data transmission phase.

APPLICATION OF KEY EXCHANGE BASED PHYSICAL LAYER SECURITY METHODS

A method making modifications during a key phase of physical layer security methods and enabling the physical layer security methods to be applicable in a wireless communication is provided. The method includes a step of generating a K common key, including steps to be carried out at a modulator during a data transmission phase.

Memory system for preventing write error
11269721 · 2022-03-08 · ·

A memory system apparatus may be provided. The memory system may have memory controller. The memory controller may be configured to perform a scrambling operation before an error correction code (ECC) operation is performed.

Memory system for preventing write error
11269721 · 2022-03-08 · ·

A memory system apparatus may be provided. The memory system may have memory controller. The memory controller may be configured to perform a scrambling operation before an error correction code (ECC) operation is performed.

HOME AUTOMATION HAVING USER PRIVACY PROTECTIONS
20210314405 · 2021-10-07 ·

An acoustic sensor is positioned in an environment and configured to generate a data stream responsive to acoustic energy in the environment. A controller is configured to receive the data stream. The controller is further configured to analyze the data stream to determine ambient acoustic signals. The controller is further configured to generate an ambient acoustic template based on the determined ambient acoustic signals. The controller is further configured to apply the ambient acoustic template to the data stream so that the ambient acoustic signals are suppressed in the data stream. The controller is further configured to analyze the data stream after the ambient acoustic signals are suppressed in order to determine if the acoustic energy in the environment includes acoustic energy of human snoring. The controller is further configured to issue a control signal to a second controller in order to engage a home automation device.

Method for encoding and decoding data by varying the distinctive characteristics of an optical radiation, encoding device and decoding system
11146393 · 2021-10-12 · ·

Encoding element (100) at least selectively transparent to an infrared or ultraviolet light radiation, incident thereon on a first incidence surface (101), wherein—in the volume defined by said encoding element (100)—a plurality of areas (104) is provided, previously selected and arranged according to a predefined pattern wherein at least one polarisation characteristic of the optical radiation (200) that is incident thereon is varied, wherein the variation of said polarisation characteristic of said incident radiation is varied according to a localised alteration pattern biunivocally associated to a predefined ciphering key, and wherein said plurality of areas is arranged between said first incidence surface (101) on which said infrared or ultraviolet light radiation is incident in use, and a second output surface (102) of said infrared or ultraviolet light optical radiation.

Method for encoding and decoding data by varying the distinctive characteristics of an optical radiation, encoding device and decoding system
11146393 · 2021-10-12 · ·

Encoding element (100) at least selectively transparent to an infrared or ultraviolet light radiation, incident thereon on a first incidence surface (101), wherein—in the volume defined by said encoding element (100)—a plurality of areas (104) is provided, previously selected and arranged according to a predefined pattern wherein at least one polarisation characteristic of the optical radiation (200) that is incident thereon is varied, wherein the variation of said polarisation characteristic of said incident radiation is varied according to a localised alteration pattern biunivocally associated to a predefined ciphering key, and wherein said plurality of areas is arranged between said first incidence surface (101) on which said infrared or ultraviolet light radiation is incident in use, and a second output surface (102) of said infrared or ultraviolet light optical radiation.

Selective enforcement of privacy and confidentiality for optimization of voice applications

A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.

Selective enforcement of privacy and confidentiality for optimization of voice applications

A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.

CHANNELIZING A WIDEBAND WAVEFORM FOR TRANSMISSION ON A SPECTRAL BAND COMPRISING UNAVAILABLE CHANNEL SEGMENTS

Methods, systems, and devices for channelizing a wideband waveform for transmission on a spectral band comprising unavailable channel segments are described. Generally, the described techniques provide for transmitting and receiving wideband waveforms when channels of a system bandwidth are unavailable for transmission. A transmitter may separate a first wideband signal into segments, with each segment a bandwidth corresponding to a channel of the system bandwidth, and may map the segments to the available channels. The transmitter may combine the mapped segments into a second wideband waveform and transmit the second wideband waveform using the available channels. A receiver may receive a first wideband signal waveform and may separate the first wideband signal waveform into segments, de-map the segments and combine the de-mapped segments into a second wideband waveform for demodulation. The techniques may be used to transmit and receive wideband waveforms over tactical data links.