Patent classifications
H04K1/06
Device and method for preventing intelligible voice recordings
A method, device, system and kit for preventing the intelligible voice recording Is provided. The voice of a subject or Interlocutor Is recorded for a given time Interval thereby providing a voice recording. The voice recording Is cut Into shorter time interval segments thereby providing a set of voice recording segments. The set of voice recording segments is mixed in a randomly rearranged order, The mixed set of voice recording segments is spliced into a single randomly mixed voice recording. Emitting the randomly mixed voice recording during speaking of the subject or interlocutor prevents the Intelligible recording of the voice of the subject or interlocutor.
Device and method for preventing intelligible voice recordings
A method, device, system and kit for preventing the intelligible voice recording Is provided. The voice of a subject or Interlocutor Is recorded for a given time Interval thereby providing a voice recording. The voice recording Is cut Into shorter time interval segments thereby providing a set of voice recording segments. The set of voice recording segments is mixed in a randomly rearranged order, The mixed set of voice recording segments is spliced into a single randomly mixed voice recording. Emitting the randomly mixed voice recording during speaking of the subject or interlocutor prevents the Intelligible recording of the voice of the subject or interlocutor.
SECURE AND EFFICIENT ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING TRANSMISSION SYSTEM WITH DISGUISED JAMMING
A securely pre-coded orthogonal frequency division multiplexing (SP-OFDM) system includes a transmitter configured to transmit a secure transmit signal through a dynamic constellation and a receiver configured to recover the original signal from the received secure transmit signal. It is aimed to reinforce the physical layer security of wireless communications under hostile interference. Potential applications include 4G and 5G communication systems, ASTC3.0 HDTV systems, WiFi systems, and any future wireless systems that utilize OFDM.
ERROR CORRECTION CODE MEMORY DEVICE AND CODEWORD ACCESSING METHOD THEREOF
The codeword accessing method including: receiving a write data with M message bits; generating parity information with N-M bits based on an error correction algorithm and the M message bits, where N and M are positive integers; transforming the M message bits and the parity information to a scrambled codeword with N bits by a scrambling operation, where the scrambled codeword contains only a part of the M message bits; and writing the scrambled codeword into a memory device.
ERROR CORRECTION CODE MEMORY DEVICE AND CODEWORD ACCESSING METHOD THEREOF
The codeword accessing method including: receiving a write data with M message bits; generating parity information with N-M bits based on an error correction algorithm and the M message bits, where N and M are positive integers; transforming the M message bits and the parity information to a scrambled codeword with N bits by a scrambling operation, where the scrambled codeword contains only a part of the M message bits; and writing the scrambled codeword into a memory device.
VOICE ENCRYPTION DEVICE AND SYSTEM FOR SECURING VOICE COMMUNICATION
A voice encryption device including a pseudorandom number generator that generates a key data stream responsive to a cryptographic key; a shift register that sequentially stores a sequence of voice data as a block of voice data; a selector that selects pieces of voice data from among the block of voice data stored by the shift register and provides a rearranged block of voice data including the selected pieces of voice data as initial pieces of voice data in the rearranged block of voice data, responsive to a key data value from among the key data stream; and a combiner that combines the rearranged block of voice data provided from the selector with the block of voice data to generate an encrypted block of voice data.
SYSTEMS AND METHODS FOR VARIABLE-LENGTH ENCODING AND DECODING FOR ENHANCING COMPUTER SYSTEMS
A method for variable length decoding, the method including: receiving, in a default word length mode, at least one first data word having a default first word length; combining the received at least one first data word as a first portion of data; receiving, after the at least one first data word, a transition word indicative of transitioning to a variable word length mode; receiving, after the transition word, a first word length word indicative of a second word length; receiving, after the first word length word, at least one second data word having the second word length; and combining the received at least one second data word as a second portion of the data.
SELECTIVE ENFORCEMENT OF PRIVACY AND CONFIDENTIALITY FOR OPTIMIZATION OF VOICE APPLICATIONS
A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.
SELECTIVE ENFORCEMENT OF PRIVACY AND CONFIDENTIALITY FOR OPTIMIZATION OF VOICE APPLICATIONS
A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.
Selective enforcement of privacy and confidentiality for optimization of voice applications
A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.