H04K1/06

Selective enforcement of privacy and confidentiality for optimization of voice applications

A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.

Systems and methods for variable-length encoding and decoding for enhancing computer systems
10516663 · 2019-12-24 · ·

A method including: parsing a first portion of data into at least one first data word having a default first word length; outputting, in a default word length mode, the at least one first data word; outputting a transition word indicative of transitioning to a variable word length mode; outputting, after the transition word, a first word length word indicative of a second word length; parsing a second portion of the data into at least one second data word having the second word length; and outputting, after the first word length word, the at least one second data word having the second word length.

METHOD AND APPARATUS FOR GENERATNG A COVER IMAGE FOR STEGANOGRAPHY
20190356476 · 2019-11-21 ·

A method and an apparatus for generating cover images for steganography are provided. The steganographic framework is designed based on an image generation system. The apparatus may encode a message to obtain a binary sequence. The apparatus may obtain a plurality of binary segments of a particular length based on the binary sequence. For each binary segment of the plurality of binary segments, the apparatus may select an image of a semantic content (e.g., a numeral digit) from a dictionary of images of random semantic contents (e.g., random numeral digits) based on the binary segment. The apparatus may combine the selected images to form at least a portion of a cover image denoting a combination of the semantic contents of the selected images (e.g., a plurality of numeral digits).

Light-based data encoding and/or decoding
11956024 · 2024-04-09 ·

Provided is a data-coding apparatus that includes: a data-input line for receiving input data; a data scrambler having light sources coupled to the data-input line and modulated in accordance with the input data, and light sensors that receive light from the light sources; and at least one light-sensing processor coupled to the light sources and configured so as to selectively isolate light signals received from individual ones of the light sources based on at least one control signal input into such data scrambler. The light-sensing processor is dynamically controlled by the control signal(s) so as to rearrange words within the input data according to patterns that change in real time.

Technologies for enhancing computer security
10326757 · 2019-06-18 · ·

A system including: at least one processor; and at least one memory, having stored thereon computer program code that, when executed by the at least one processor, controls the at least one processor to: receive a first sequence of values; segment the first sequence of values into a first subsequence having a first length and a second subsequence having a second length; modify the first subsequence by inserting one or more values into the first subsequence to create a modified first subsequence of a third length; modify the second subsequence by one or more inserting values into the second subsequence to create a modified second subsequence of the third length; combine the modified first subsequence and the modified second subsequence to create a second sequence of values; and output the second sequence of values.

DEVICE AND METHOD FOR PREVENTING INTELLIGIBLE VOICE RECORDINGS
20190147902 · 2019-05-16 ·

A method, device, system and kit for preventing the intelligible voice recording Is provided. The voice of a subject or Interlocutor Is recorded for a given time Interval thereby providing a voice recording. The voice recording Is cut Into shorter time interval segments thereby providing a set of voice recording segments. The set of voice recording segments is mixed in a randomly rearranged order, The mixed set of voice recording segments is spliced into a single randomly mixed voice recording. Emitting the randomly mixed voice recording during speaking of the subject or interlocutor prevents the Intelligible recording of the voice of the subject or interlocutor.

DEVICE AND METHOD FOR PREVENTING INTELLIGIBLE VOICE RECORDINGS
20190147902 · 2019-05-16 ·

A method, device, system and kit for preventing the intelligible voice recording Is provided. The voice of a subject or Interlocutor Is recorded for a given time Interval thereby providing a voice recording. The voice recording Is cut Into shorter time interval segments thereby providing a set of voice recording segments. The set of voice recording segments is mixed in a randomly rearranged order, The mixed set of voice recording segments is spliced into a single randomly mixed voice recording. Emitting the randomly mixed voice recording during speaking of the subject or interlocutor prevents the Intelligible recording of the voice of the subject or interlocutor.

SYSTEM AND METHOD FOR WIRELESS POWER TRANSFER USING TIME REVERSED ELECTROMAGNETIC WAVE PROPAGATION

The subject method for delivering power to a moving target wirelessly via electromagnetic time reversal can find applications in wireless electrical transmission to portable devices, wireless heating of portable devices, novel wirelessly powered accelerometers, hyperthermic treatment of cancers, and many other applications. The subject non-linear time reversed electromagnetic waves based wireless power transmission (WPT) system targets either a single linear or non-linear object where a selective targeting between two diodes has been demonstrated simultaneously with different degrees of non-linearity in a three-dimensional ray-chaotic billiard model. A dual-purpose rectenna with harmonic generation for wireless power transfer by non-linear time-reversal has been designed for the subject system using the Schottky diode.

SYSTEM AND METHOD FOR WIRELESS POWER TRANSFER USING TIME REVERSED ELECTROMAGNETIC WAVE PROPAGATION

The subject method for delivering power to a moving target wirelessly via electromagnetic time reversal can find applications in wireless electrical transmission to portable devices, wireless heating of portable devices, novel wirelessly powered accelerometers, hyperthermic treatment of cancers, and many other applications. The subject non-linear time reversed electromagnetic waves based wireless power transmission (WPT) system targets either a single linear or non-linear object where a selective targeting between two diodes has been demonstrated simultaneously with different degrees of non-linearity in a three-dimensional ray-chaotic billiard model. A dual-purpose rectenna with harmonic generation for wireless power transfer by non-linear time-reversal has been designed for the subject system using the Schottky diode.

SELECTIVE ENFORCEMENT OF PRIVACY AND CONFIDENTIALITY FOR OPTIMIZATION OF VOICE APPLICATIONS

A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.