H04K1/06

SELECTIVE ENFORCEMENT OF PRIVACY AND CONFIDENTIALITY FOR OPTIMIZATION OF VOICE APPLICATIONS

A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.

SYSTEMS AND METHODS FOR VARIABLE-LENGTH ENCODING AND DECODING FOR ENHANCING COMPUTER SYSTEMS
20190020645 · 2019-01-17 ·

A method including: parsing a first portion of data into at least one first data word having a default first word length; outputting, in a default word length mode, the at least one first data word; outputting a transition word indicative of transitioning to a variable word length mode; outputting, after the transition word, a first word length word indicative of a second word length; parsing a second portion of the data into at least one second data word having the second word length; and outputting, after the first word length word, the at least one second data word having the second word length.

TECHNOLOGIES FOR ENHANCING COMPUTER SECURITY
20180343244 · 2018-11-29 ·

A system including: at least one processor; and at least one memory, having stored thereon computer program code that, when executed by the at least one processor, controls the at least one processor to: receive a first sequence of values; segment the first sequence of values into a first subsequence having a first length and a second subsequence having a second length; modify the first subsequence by inserting one or more values into the first subsequence to create a modified first subsequence of a third length; modify the second subsequence by one or more inserting values into the second subsequence to create a modified second subsequence of the third length; combine the modified first subsequence and the modified second subsequence to create a second sequence of values; and output the second sequence of values.

Technologies for enhancing computer security
10116651 · 2018-10-30 · ·

A method of securely transmitting data comprising (1) obtaining an unencrypted data stream comprising a first sequence of values, (2) segmenting a first portion of the first sequence of values into an original first word having a word-length equal to a first variable, (3) segmenting a second portion of the first sequence of values into an original second word having a word-length equal to a second variable different than the first variable, (4) inserting random values at predetermined locations in the original first and second words to generate modified first and second words, the modified first and second words having a word-length equal to a third variable different than the first and second variables, and (5) combining the modified first and second words into a second sequence of values defining an encrypted data stream.

Method and system for providing a speech-based service, in particular for the control of room control elements in buildings
12087292 · 2024-09-10 · ·

Various embodiments of the teachings herein include methods and systems for providing a speech-based service for the control of room control elements in buildings. Speech instructions are received by means of an audio device. The audio device is configured to analyze the received speech instructions, to convert them into corresponding operating commands for room control elements for the control of, in particular, HVAC devices (e.g. field devices) in a building and to pass them on to the corresponding room control elements. Before the receipt of the speech instructions by the audio device, the identity of the sender (user) of the speech instructions is anonymized by means of an anonymization service.

Technologies for enhancing computer security
10057250 · 2018-08-21 · ·

A method includes providing a plurality of variables and a variable. The variables differ from each other. The variables differ from the variable. The further method includes providing a lookup table indexing a plurality of characters via a plurality of values based on a first numeral system, converting a message into a first sequence of values based on the table, converting the first sequence into a second sequence of values based on a second numeral system different from the first system and according to a preset format, combining the second sequence into a single sequence via removing the format, generating a first plurality of subsequences from the single sequence based on segmentation of the sequence via alternating the variables, converting the first subsequences into a second plurality of subsequences such that each of the second subsequences is sized according to the variable, and transmitting the second subsequences.

CODING AND ENCRYPTION FOR WAVELENGTH DIVISION MULTIPLEXING VISIBLE LIGHT COMMUNICATIONS
20180054300 · 2018-02-22 · ·

The method includes a first encryption step of encrypting each of a plurality of data streams to obtain a respective encrypted data stream, a mapping step of mapping the plurality of encrypted data streams obtained in the first encryption step to a plurality of transmission streams for transmission via the optical transmission units, wherein the transmission streams and optical transmission units are in a one-to-one relationship, and wherein each transmission stream is mapped to by at least two of the plurality of encrypted data streams. The method further includes a second encryption step of encrypting each of the plurality of transmission streams to obtain a respective encrypted transmission stream, and a transmission step of transmitting each of the plurality of encrypted transmission streams obtained in the second encryption step via a respective optical transmission unit.

Scrambling bit transmissions

A bus communicates bits in parallel between a transmitter and receiver. A selected set of bits has its bits scrambled. Scrambling the bits includes assigning two or more bits of the selected set of bits to atypical lanes of the bus. By scrambling the bits, the order in which the bits of the selected set of bits are ready by a processer are obscured. The set of bits is transmitted to the receiver with one or more delays. The delays are on one or more of the lanes of the bus. The delays indicate the order of the bits. The receiver is configured to use the delays to identify the order of the bits and unscramble the set of bits.

System and Method for Modulation Domain-Based Audio Signal Encoding

A method, computer program product, and computing system for processing an audio signal by converting the audio signal to the modulation domain. The modulation domain audio signal is encoded with a plurality of carrier signals and a plurality of modulator signals derived from the modulation domain audio signal. The encoded modulation domain audio signal is converted to the time domain.

Technologies for enhancing computer security
RE046652 · 2017-12-26 · ·

A method includes providing a plurality of variables and a variable. The variables differ from each other. The variables differ from the variable. The further method includes providing a lookup table indexing a plurality of characters via a plurality of values based on a first numeral system, converting a message into a first sequence of values based on the table, converting the first sequence into a second sequence of values based on a second numeral system different from the first system and according to a preset format, combining the second sequence into a single sequence via removing the format, generating a first plurality of subsequences from the single sequence based on segmentation of the sequence via alternating the variables, converting the first subsequences into a second plurality of subsequences such that each of the second subsequences is sized according to the variable, and transmitting the second subsequences.