Patent classifications
H04M1/68
SOUND PROCESSING LOGIC CONNECTIONS
In an example implementation according to aspects of the present disclosure, a method of a computing device may include determining whether a first mode or a second mode is selected. If the first mode is selected, the computing device connects a microphone to a sound processing logic. If the second mode is selected, the computing device disconnects the microphone from the sound processing logic and connecting an audio source to the sound processing logic.
Methods and devices for multi-link device (MLD) address discovery in a wireless network
Embodiments of the present invention provide methods and devices for transmitting or receiving beacon frames and probe response frames that include MAC addresses of a multi-link device (MLD) operating on multiple links in a wireless network. For example, the beacon frames and probe response frames can include an MLD MAC address that uniquely identifies an AP MLD in a wireless network, and can optionally include one or more WM MAC addresses of STAs of the AP MLD. The MAC addresses can be used to by wireless devices (e.g., STA MLDs) to connect to and associate with the AP MLD, and can be used to generate a password element used during authentication between wireless devices.
SYSTEM AND METHOD TO PREVENT UNAUTHORIZED VOICE DETECTION VIA FIBER LINKS
A random acoustic phase scrambler device is installed in-line with a telecommunications fiber link to prevent voice detection via fiber links. The device includes a transducer to produce vibrations; a length of optical fiber positioned to receive the vibration from the transducer; and a random acoustic phase driver configured to control the intensity and frequency of the vibrations. The transducer produces randomized vibrations within an acoustic bandwidth. The device is configured to introduce device-induced phase changes to signals within the telecommunications fiber link. The bandwidth of the device-induced phase changes is greater than the bandwidth of voice-induced phase changes, and the device-induced phase changes are greater in intensity than the voice-induced phase changes. The device-induced phase changes mask voice-induced phase changes through the telecommunications fiber link that are otherwise detectable by voice detection equipment tapped to the telecommunications fiber link.
SYSTEM AND METHOD TO PREVENT UNAUTHORIZED VOICE DETECTION VIA FIBER LINKS
A random acoustic phase scrambler device is installed in-line with a telecommunications fiber link to prevent voice detection via fiber links. The device includes a transducer to produce vibrations; a length of optical fiber positioned to receive the vibration from the transducer; and a random acoustic phase driver configured to control the intensity and frequency of the vibrations. The transducer produces randomized vibrations within an acoustic bandwidth. The device is configured to introduce device-induced phase changes to signals within the telecommunications fiber link. The bandwidth of the device-induced phase changes is greater than the bandwidth of voice-induced phase changes, and the device-induced phase changes are greater in intensity than the voice-induced phase changes. The device-induced phase changes mask voice-induced phase changes through the telecommunications fiber link that are otherwise detectable by voice detection equipment tapped to the telecommunications fiber link.
Adapting wireless communication device antenna selection based on user identity and operation context
A mobile communication device that adapts its usage of antennas based on a rule set and an operation context. The device comprises a plurality of antennas, a radio modem, a processor, a non-transitory memory, and a client application stored in the non-transitory memory. When executed by the processor, the application receives a biometric input for authenticating a session of a user on the device, wherein the biometric input is associated with a biometric profile, sends a request for a rule set to a server computer, and receives the rule set. The application further stores the rule set, evaluates the rule set based on the operation context to determine an antenna operation setting, and commands the radio modem to configure itself to the antenna operation setting, whereby the radio modem is restricted from using all of the plurality of antennas at the same time in at least some operation contexts.
ANTI-EAVESDROP SECURITY DEVICE
A system and method to prevent eavesdropping by a device. An anti-eavesdrop component is installed on the device. The anti-eavesdrop component is configured to actively prevent the device from capturing audio from the environment. In response to installing the anti-eavesdrop component, the device recognizes the anti-eavesdrop component as a primary audio input for the device. The anti-eavesdrop component then proceeds to block the device from capturing outside audio by injecting noise or otherwise interfering with the primary audio input.
Inter-channel level difference based acoustic tap detection
A system configured to detect a tap event on a surface of a device only using microphone audio data. For example, instead of using a physical sensor to detect the tap event, the device may detect a tap event in proximity to a microphone based on a power level difference between two or more microphones. When a power ratio exceeds a threshold, the device may detect a tap event and perform an action. For example, the device may output an alarm and use a detected tap event as an input to delay or end the alarm. In some examples, the device may detect a tap event using a plurality of microphones. Additionally or alternatively, the device may distinguish between multiple tap events based on a location of the tap event, enabling the device to perform two separate actions depending on the location.
Inter-channel level difference based acoustic tap detection
A system configured to detect a tap event on a surface of a device only using microphone audio data. For example, instead of using a physical sensor to detect the tap event, the device may detect a tap event in proximity to a microphone based on a power level difference between two or more microphones. When a power ratio exceeds a threshold, the device may detect a tap event and perform an action. For example, the device may output an alarm and use a detected tap event as an input to delay or end the alarm. In some examples, the device may detect a tap event using a plurality of microphones. Additionally or alternatively, the device may distinguish between multiple tap events based on a location of the tap event, enabling the device to perform two separate actions depending on the location.
System and methods for a multi-factor remote user authentication
A system of security for a remote user authentication service (RUAS) comprising: an authentication server, mobile wireless device with a SIM card embedded in the mobile wireless device and a RUAS logic that provide a multi-factor remote user authentication service, where one of the factors is a “what you have” factor of authentication, an electronic token in physical possession of the user that is interfaced with the authentication server over the global computer network; the SIM card, embedded in the mobile wireless device, emulates the electronic token to provide the “what you have” factor, thus obviating the need for the business to provision and for the user to carry a separate physical electronic token.
System, method, and apparatus for detecting and preventing wireless connections
A method of detecting and disabling offending devices includes monitoring for a radio frequency signal. When an offending device initializes and registers with a cell tower, it emits the radio frequency signal. After the radio frequency signal is detected, a message including an identification of the radio frequency signal is transmitted to a receiver of a base station. Responsive to receiving the message, the base station sends a secure transaction that includes an indication of the radio frequency signal to a processor of a cellular carrier system. Responsive to receiving the secure transaction, the processor of the cellular carrier system correlates a time and the radio frequency signal with an account associated with the registration of the offending device, disconnects from the offending device, and disables an account associated with the offending device.