H04K3/45

SPEECH REPRODUCTION DEVICE CONFIGURED FOR MASKING REPRODUCED SPEECH IN A MASKED SPEECH ZONE

A speech reproduction device for reproducing speech based on a received speech signal so that the reproduced speech is intelligible in a clear speech zone and unintelligible in a masked speech zone includes an audio processing module configured for receiving the speech signal; a set of speech loudspeakers configured for reproducing the speech based on one or more speech loudspeaker signals; and a set of masking sound loudspeakers configured for producing a masking sound based on one or more masking sound loudspeaker signals, wherein the masking sound masks the speech in the masked speech zone; wherein the audio processing module includes a speech signal analysis module configured for producing one or more analysis signals based on spectral and/or temporal characteristics of the speech signal; wherein the audio processing module includes a masking sound generator configured for producing one or more masking sound signals based on the one or more analysis signals.

Distributed rate allocation and collision detection in wireless networks

A hybrid cellular and non-cellular multi-hop communication device, including a hand-held wireless device having one or more antennas, a cellular wireless interface connected to at least some of the one or more antennas, and a non-cellular wireless interface connected to at least some of the one or more antennas. The non-cellular wireless interface may include a rate allocator configured to select a physical-layer rate of transmission of data from the non-cellular wireless interface based on a queue length of data to be transmitted from the hand-held cellular device and a transmitter configured to wirelessly transmit data from the queue and adjust physical-layer transmission parameters based on a physical-layer rate selected by the rate allocator.

System architecture for managing resources in a communication network
09787426 · 2017-10-10 · ·

A system architecture for managing resources in a communication network comprises in combination at least the following elements: a plurality of radio equipments working in a given frequency band and with identical frequency hopping rules; the radio equipments are managed by a master device; and a radio equipment comprises at least: a radiocommunication module that carries the radiocommunications; a module suitable for tapping, monitoring and intercepting radio signals in the environment and for recording them locally in a database; a module suitable for disrupting non-authorized communications; and a local “3 in 1” management module receiving the orders emitted by the master device, the management module being suitable for controlling the various modules of the radio equipment; a radio-router module; and a tapping and monitoring module.

Device and method for jamming over the air signals in a geographical delimited area
09787425 · 2017-10-10 ·

The present invention is generally related to a device for providing wireless jamming signals in a delimited geographic area. The device is comprised of an on/off initiation module that allows the user to turn-on or turn-off the device, and initialize the jamming wireless signals device, a central controller module to distribute and analyze the information of the system, a signal transmitter device to transmit the jamming signals, a device to calculate distances to obtain the distances between the said signal transmitter and the objects in the delimited geographic area. The jamming device once is turned on calculates the distances and the power where to transmit the jamming signals to cover the required geographic area. This device will be capable of jamming one or more types of wireless signals at the same time such as Wi-Fi, cell phones and other wireless signals.

Privacy device for smart speakers
11503418 · 2022-11-15 ·

Systems, apparatuses, and methods are described for a privacy blocking device configured to prevent receipt, by a listening device, of video and/or audio data until a trigger occurs. A blocker may be configured to prevent receipt of video and/or audio data by one or more microphones and/or one or more cameras of a listening device. The blocker may use the one or more microphones, the one or more cameras, and/or one or more second microphones and/or one or more second cameras to monitor for a trigger. The blocker may process the data. Upon detecting the trigger, the blocker may transmit data to the listening device. For example, the blocker may transmit all or a part of a spoken phrase to the listening device.

APPARATUS AND METHOD FOR RAPID ELECTRONIC DEVICE DISCOVERY

An apparatus, method, and computer program product that intentionally illuminate at least one target device with electromagnetic energy having specific characteristics (e.g., frequency, power, waveform, directionality, duration, etc.). The target device, which may be an unpowered data storage device, acts as a non-linear mixer and is forced to emit radiative signals containing information about the target device behavior, state, and physical characteristics. Embodiments receive the forced emissions, extract useful data, and analyze the data to determine target device characteristics (e.g., a target device type, based on a comparison of data from known types). Embodiments control the illumination so the forced emissions radiate from an enclosure without interfering with tactical communications, and so that stored target device data is not affected. Embodiments can locate a hidden target device via the strength and directionality of the forced emissions. The apparatus is portable for use by military, intelligence, and security personnel.

Systems and methods for radio frequency hopping communications jamming utilizing software defined radio platforms
09749085 · 2017-08-29 ·

A dynamically-reconfigurable multiband multiprotocol communications jamming system and method is provided that are particularly suited for the generation of effective radio-frequency waveforms/noise output that successively translates up and down the RF spectrum. The system and method are particularly suited for strategically targeting specific frequencies in order to disrupt a communications network or networks, and can be rapidly deployed via delivery platforms, such as artillery and other projectile mechanisms, remote operated vehicles (unmanned aerial, sea or land systems) or targeted air or land delivery via manned assets or automated or robotic support means, or manual delivery by personnel.

Method and apparatus for providing broadcast channel encryption to enhance cellular network security

A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an identifier of the encryption key and transmits the encrypted broadcast message over a broadcast channel. A method for decrypting a broadcast message that is encrypted is also disclosed.

Battery-equipped cellular telephone case with internal sound generator and layered sound blockage for privacy
09747884 · 2017-08-29 · ·

The subject matter herein field is for multiple and complimentary systems in the structure of a cellular device case so as to provide sound jamming and/or sound insulation, and/or powered noise cancellation as means of restriction the entry of useful sound into the microphone(s) of cellular smartphone devices, as a means of citizen counter-action of the “constant surveillance” characteristics inherent in the “always on,” microphone systems as described under Background of the Subject matter, above.

DETERRENT FOR UNMANNED AERIAL SYSTEMS
20220308162 · 2022-09-29 ·

A system for providing integrated detection and deterrence against an unmanned vehicle including but not limited to aerial technology unmanned systems using a detection element, a tracking element, an identification element and an interdiction or deterrent element. Elements contain sensors that observe real time quantifiable data regarding the object of interest to create an assessment of risk or threat to a protected area of interest. This assessment may be based e.g., on data mining of internal and external data sources. The deterrent element selects from a variable menu of possible deterrent actions. Though designed for autonomous action, a Human in the Loop may override the automated system solutions.