H04K1/04

METHOD FOR ENCODING AND DECODING DATA BY VARYING THE DISTINCTIVE CHARACTERISTICS OF AN OPTICAL RADIATION, ENCODING DEVICE AND DECODING SYSTEM
20200145205 · 2020-05-07 ·

Encoding element (100) at least selectively transparent to an infrared or ultraviolet light radiation, incident thereon on a first incidence surface (101), whereinin the volume defined by said encoding element (100)a plurality of areas (104) is provided, previously selected and arranged according to a predefined pattern wherein at least one polarisation characteristic of the optical radiation (200) that is incident thereon is varied, wherein the variation of said polarisation characteristic of said incident radiation is varied according to a localised alteration pattern biunivocally associated to a predefined ciphering key, and wherein said plurality of areas is arranged between said first incidence surface (101) on which said infrared or ultraviolet light radiation is incident in use, and a second output surface (102) of said infrared or ultraviolet light optical radiation.

SYSTEM AND METHOD OF DIGITAL SIGNAL PROCESSING
20200145044 · 2020-05-07 · ·

A system and method for transmitting a digital signal comprising includes a random number generator for generating a pseudorandom code. A scheduler stores a plurality of signal sequences each matching a set of bandwidth-time products and center frequencies with a stored code. The scheduler selects a signal sequence by matching the pseudorandom code with one of the stored codes. The scheduler selects a bandwidth-time product and center frequency based on the selected signal sequence. A baseband processing unit generates the digital signal based on a selected bandwidth-time product and center frequency. A front end processing and beamforming unit broadcasts the digital signal.

Cooperative Intrusion Detection
20200099459 · 2020-03-26 · ·

In a computer network that has a plurality of nodes, a measure of trustworthiness for a particular node can be updated by other nodes that monitor the particular node's behavior. This includes collecting trustworthiness reports from the other nodes; updating the particular node's trustworthiness level based on the reports; and causing the particular node to route data in the computer network based on its trustworthiness level. The particular node's role in performing at least one of a set of functions is based on a hierarchy of trustworthiness levels, wherein the functions can include monitoring other nodes; sending alerts when anomalous behavior is detected; transmitting a free-antibody software program to a requesting node; updating defensive programs; participating in consensus-based threat analysis with other nodes; identifying threats; tagging suspicious nodes; and performing countermeasures against identified threats.

SELECTIVE ENFORCEMENT OF PRIVACY AND CONFIDENTIALITY FOR OPTIMIZATION OF VOICE APPLICATIONS

A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.

SELECTIVE ENFORCEMENT OF PRIVACY AND CONFIDENTIALITY FOR OPTIMIZATION OF VOICE APPLICATIONS

A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.

MASKING OPEN SPACE NOISE USING SOUND AND CORRESPONDING VISUAL

Methods and apparatuses for addressing open space noise are disclosed. In one example, a method for masking open space noise includes optimizing a recorded naturally occurring sound signal. The method also includes outputting the optimized recorded naturally occurring sound signal from a plurality of speakers distributed in the open space. Further, the method includes displaying a natural system complementing the optimized recorded naturally occurring sound signal.

MASKING OPEN SPACE NOISE USING SOUND AND CORRESPONDING VISUAL

Methods and apparatuses for addressing open space noise are disclosed. In one example, a method for masking open space noise includes optimizing a recorded naturally occurring sound signal. The method also includes outputting the optimized recorded naturally occurring sound signal from a plurality of speakers distributed in the open space. Further, the method includes displaying a natural system complementing the optimized recorded naturally occurring sound signal.

CHANNEL WIDTH AGILE COMMUNICATION METHOD
20200028610 · 2020-01-23 ·

The present disclosure relates to a communication method related with channel width agile. The method uses a channel generation circuit at a signal transmitting end to generate a channel whose channel width can be changed according to a certain law, and a channel detection circuit at a signal receiving end corresponding thereto to detect the corresponding channel width by the same channel width agile law, thereby achieving the secure reception of the signal. Due to the agility of the channel width, communication security is ensured, and it does not conflict with other technologies (such as frequency hopping), and the channel width can be dynamically allocated. In this way, the advantages of high security, compatibility, and high spectrum utilization can be achieved. Meanwhile, the method realizes the maximum possible optimization of the channel and is very creative.

Selective enforcement of privacy and confidentiality for optimization of voice applications

A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.

Selective enforcement of privacy and confidentiality for optimization of voice applications

A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.