Patent classifications
H04K1/04
Home automation having user privacy protections
An acoustic sensor is positioned in an environment and configured to generate a data stream responsive to acoustic energy in the environment. A controller is configured to receive the data stream. The controller is further configured to analyze the data stream to determine ambient acoustic signals. The controller is further configured to generate an ambient acoustic template based on the determined ambient acoustic signals. The controller is further configured to apply the ambient acoustic template to the data stream so that the ambient acoustic signals are suppressed in the data stream. The controller is further configured to analyze the data stream after the ambient acoustic signals are suppressed in order to determine if the acoustic energy in the environment includes acoustic energy of human snoring. The controller is further configured to issue a control signal to a second controller in order to engage a home automation device.
Channelizing a wideband waveform for transmission on a spectral band comprising unavailable channel segments
Methods, systems, and devices for channelizing a wideband waveform for transmission on a spectral band comprising unavailable channel segments are described. Generally, the described techniques provide for transmitting and receiving wideband waveforms when channels of a system bandwidth are unavailable for transmission. A transmitter may separate a first wideband signal into segments, with each segment a bandwidth corresponding to a channel of the system bandwidth, and may map the segments to the available channels. The transmitter may combine the mapped segments into a second wideband waveform and transmit the second wideband waveform using the available channels. A receiver may receive a first wideband signal waveform and may separate the first wideband signal waveform into segments, de-map the segments and combine the de-mapped segments into a second wideband waveform for demodulation. The techniques may be used to transmit and receive wideband waveforms over tactical data links.
SCRAMBLING FOR WIRELESS COMMUNICATIONS
Aspects of the present disclosure describe scrambling of information for wireless communications to prevent deciphering or altering by unintended recipients. An example method may include generating, by a first device, a scrambling key based on at least one of a freshness parameter or a private key. The private key is known by the first device and a second device. The method also includes scrambling a payload based on the scrambling key at a physical layer. A packet includes the payload for wireless transmission from the first device to the second device via a shared channel.
Secure and efficient orthogonal frequency division multiplexing transmission system with disguised jamming
A securely pre-coded orthogonal frequency division multiplexing (SP-OFDM) system includes a transmitter configured to transmit a secure transmit signal through a dynamic constellation and a receiver configured to recover the original signal from the received secure transmit signal. It is aimed to reinforce the physical layer security of wireless communications under hostile interference. Potential applications include 4G and 5G communication systems, ASTC3.0 HDTV systems, WiFi systems, and any future wireless systems that utilize OFDM.
VOICE MORPHING APPARATUS HAVING ADJUSTABLE PARAMETERS
A voice morphing apparatus having adjustable parameters is described. The disclosed system and method include a voice morphing apparatus that morphs input audio to mask a speaker's identity. Parameter adjustment uses evaluation of an objective function that is based on the input audio and output of the voice morphing apparatus. The voice morphing apparatus includes objectives that are based adversarially on speaker identification and positively on audio fidelity. Thus, the voice morphing apparatus is adjusted to reduce identifiability of speakers while maintaining fidelity of the morphed audio. The voice morphing apparatus may be used as part of an automatic speech recognition system.
Cooperative intrusion detection
In a computer network that has a plurality of nodes, a measure of trustworthiness for a particular node can be updated by other nodes that monitor the particular node's behavior. This includes collecting trustworthiness reports from the other nodes; updating the particular node's trustworthiness level based on the reports; and causing the particular node to route data in the computer network based on its trustworthiness level. The particular node's role in performing at least one of a set of functions is based on a hierarchy of trustworthiness levels, wherein the functions can include monitoring other nodes; sending alerts when anomalous behavior is detected; transmitting a free-antibody software program to a requesting node; updating defensive programs; participating in consensus-based threat analysis with other nodes; identifying threats; tagging suspicious nodes; and performing countermeasures against identified threats.
IN-HOME LEGACY DEVICE ONBOARDING AND PRIVACY ENHANCED MONITORING
Detecting and monitoring legacy devices (such as appliances in a home) using audio sensing is disclosed. Methods and systems are provided for transforming audio data captured by the sensor to afford privacy when speech is overheard by the sensor. Because these transformations may negatively impact the ability to detect/monitor devices, an effective transformation is determined based on both privacy and detectability concerns.
Spectrum sensing falsification detection in dense cognitive radio networks
Systems and associated methods for detecting a set of spectrum sensing falsification (SSF) attacks in a geographic database (GDB) driven cognitive radio (CR) system. Viewing the GDB as a type of non-orthogonal compressive sensing (CS) dictionary, the composite power spectral density (PSD) estimate at a candidate CR is approximated by a small number of sensor nodes listed in the GDB. In a dense CR network, the PSD estimate at a CR may contain a composite mixture of spectrally overlapping signals. An implementation of an optimized, greedy algorithm orthogonal matching pursuit (OMP) returns a set of sensor nodes which are suspected to be in the vicinity of the CR. A sufficient match between the PSD estimate reported by a candidate CR and the PSD that is sparsely approximated from the SNs in its area provides confidence (trust) metrics which may be used to detect potential SSF attacks.
Intrusion detection and radio fingerprint tracking
A radio transmitter adjusts the spectral, amplitude, and/or phase characteristics of its transmissions to defeat radio fingerprinting identification without destroying the content of the transmissions. The transmitter determines a threshold of signal distortion that impedes RF fingerprint identification while providing an acceptable amount of degradation to data transmissions and then synthesizes a distortion of its unique RF fingerprint to impede identification. The transmitter may create RF fingerprint personalities to be paired with different radio protocol behaviors and subscriber terminal identification codes (e.g., MAC addresses or SMSIs) for generating different radio identities.
Device and method for preventing intelligible voice recordings
A method, device, system and kit for preventing the intelligible voice recording Is provided. The voice of a subject or Interlocutor Is recorded for a given time Interval thereby providing a voice recording. The voice recording Is cut Into shorter time interval segments thereby providing a set of voice recording segments. The set of voice recording segments is mixed in a randomly rearranged order, The mixed set of voice recording segments is spliced into a single randomly mixed voice recording. Emitting the randomly mixed voice recording during speaking of the subject or interlocutor prevents the Intelligible recording of the voice of the subject or interlocutor.