H04K1/06

PHYSICAL LAYER SECURED MESSAGE SEGMENTATION AND TRANSMISSION OVER DIFFERENT BEAMS

A method of secure wireless communication is performed by a user equipment (UE). The method receives, from a base station, sub-messages of a secured physical layer message, each sub-message received over a different beam. The method also decodes the sub-messages into decoded message segments. Further, the method reconstructs the secured physical layer message from the decoded message segments. A method of secure wireless communication by a base station includes receiving, from a user equipment (UE), a list of candidate beams for transmission and a reception metric for each of the candidate beams. The method also includes segmenting a secured physical layer message into sub-messages. The method further includes transmitting, to the UE, a control message indicating a structure of the secured message and a transmit beam for each of the plurality of sub-messages; and transmitting, to the UE, each sub-message over a different transmit beam of the candidate beams.

ENCRYPTED COMMUNICATION OF A SENSOR DATA CHARACTERISTIC
20220263806 · 2022-08-18 ·

A sensor may obtain sensor data. The sensor may transmit the sensor data to a controller via a sensor-controller interface. The sensor may determine, based on the sensor data, a security characteristic for the sensor data. The sensor may encrypt the security characteristic to generate an encrypted security characteristic. The sensor may transmit the encrypted security characteristic to the controller via the sensor-controller interface.

Selective enforcement of privacy and confidentiality for optimization of voice applications

A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.

Selective enforcement of privacy and confidentiality for optimization of voice applications

A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.

System and method for wireless power transfer using time reversed electromagnetic wave propagation

The subject method for delivering power to a moving target wirelessly via electromagnetic time reversal can find applications in wireless electrical transmission to portable devices, wireless heating of portable devices, novel wirelessly powered accelerometers, hyperthermic treatment of cancers, and many other applications. The subject non-linear time reversed electromagnetic waves based wireless power transmission (WPT) system targets either a single linear or non-linear object where a selective targeting between two diodes has been demonstrated simultaneously with different degrees of non-linearity in a three-dimensional ray-chaotic billiard model. A dual-purpose rectenna with harmonic generation for wireless power transfer by non-linear time-reversal has been designed for the subject system using the Schottky diode.

System and method for wireless power transfer using time reversed electromagnetic wave propagation

The subject method for delivering power to a moving target wirelessly via electromagnetic time reversal can find applications in wireless electrical transmission to portable devices, wireless heating of portable devices, novel wirelessly powered accelerometers, hyperthermic treatment of cancers, and many other applications. The subject non-linear time reversed electromagnetic waves based wireless power transmission (WPT) system targets either a single linear or non-linear object where a selective targeting between two diodes has been demonstrated simultaneously with different degrees of non-linearity in a three-dimensional ray-chaotic billiard model. A dual-purpose rectenna with harmonic generation for wireless power transfer by non-linear time-reversal has been designed for the subject system using the Schottky diode.

In-home legacy device onboarding and privacy enhanced monitoring

Detecting and monitoring legacy devices (such as appliances in a home) using audio sensing is disclosed. Methods and systems are provided for transforming audio data captured by the sensor to afford privacy when speech is overheard by the sensor. Because these transformations may negatively impact the ability to detect/monitor devices, an effective transformation is determined based on both privacy and detectability concerns.

SYSTEMS AND METHODS FOR VARIABLE-LENGTH ENCODING AND DECODING FOR ENHANCING COMPUTER SYSTEMS
20210168131 · 2021-06-03 ·

A method for variable length decoding, the method including: receiving, in a default word length mode, at least one first data word having a default first word length; combining the received at least one first data word as a first portion of data; receiving, after the at least one first data word, a transition word indicative of transitioning to a variable word length mode; receiving, after the transition word, a first word length word indicative of a second word length; receiving, after the first word length word, at least one second data word having the second word length; and combining the received at least one second data word as a second portion of the data.

METHOD FOR PREVENTING INTELLIGIBLE VOICE RECORDINGS
20210050032 · 2021-02-18 ·

A method, for preventing the intelligible voice recording is provided. The voice of a subject or interlocutor is recorded for a given time interval thereby providing a voice recording. The voice recording is cut into shorter time interval segments thereby providing a set of voice recording segments. The set of voice recording segments is mixed in a randomly rearranged order. The mixed set of voice recording segments is spliced into a single randomly mixed voice recording. Emitting the randomly mixed voice recording during speaking of the subject or interlocutor prevents the intelligible recording of the voice of the subject or interlocutor.

METHOD FOR PREVENTING INTELLIGIBLE VOICE RECORDINGS
20210050032 · 2021-02-18 ·

A method, for preventing the intelligible voice recording is provided. The voice of a subject or interlocutor is recorded for a given time interval thereby providing a voice recording. The voice recording is cut into shorter time interval segments thereby providing a set of voice recording segments. The set of voice recording segments is mixed in a randomly rearranged order. The mixed set of voice recording segments is spliced into a single randomly mixed voice recording. Emitting the randomly mixed voice recording during speaking of the subject or interlocutor prevents the intelligible recording of the voice of the subject or interlocutor.