H04K3/46

Masking open space noise using sound and corresponding visual

Methods and apparatuses for addressing open space noise are disclosed. In one example, a method for masking open space noise includes outputting from a speaker a speaker sound corresponding to a flow of water, and displaying a water element system, the water element system generating a sound of flowing water.

Waveform transformation and reconstruction

A method for transforming and reconstructing a signal includes receiving a plurality of samples of a waveform of the signal at different points in time. The waveform of the signal is transformed, for each sample, into an in-phase (I) component and a quadrature (Q) component. A derotational circuit applies a delayed complex conjugate multiple (DCM) to the signal to determine a constant product having an I component (I.sub.c) and a Q component (Q.sub.c). A magnitude component is determined based on I.sub.c and Q.sub.c. A delta phase component is determined based on I.sub.c and Q.sub.c. The magnitude component is processed to create a processed magnitude component. The delta phase component is processed to create a processed delta phase component. An IQ waveform is created by reconstructing the waveform of the signal based on the processed magnitude component and the processed phase component.

Masking open space noise using sound and corresponding visual

Methods and apparatuses for addressing open space noise are disclosed. In one example, a method for masking open space noise includes outputting from a speaker a speaker sound corresponding to a flow of water, and displaying a water element system, the water element system generating a sound of flowing water.

Speech privacy system and/or associated method
10373626 · 2019-08-06 · ·

Certain example embodiments relate to speech privacy systems and/or associated methods. The techniques described herein disrupt the intelligibility of the perceived speech by, for example, superimposing onto an original speech signal a masking replica of the original speech signal in which portions of it are smeared by a time delay and/or amplitude adjustment, with the time delays and/or amplitude adjustments oscillating over time. In certain example embodiments, smearing of the original signal may be generated in frequency ranges corresponding to formants, consonant sounds, phonemes, and/or other related or non-related information-carrying building blocks of speech. Additionally, or in the alternative, annoying reverberations particular to a room or area in low frequency ranges may be cut out of the replica signal, without increasing or substantially increasing perceived loudness.

Programmable apparatus for synthesized filter notch

Generally discussed herein are systems, apparatuses, and methods for generating a replica of a first signal with a notch at one or more desired frequencies. In an example, an apparatus can include a pulse cataloger configured to analyze the first signal and to provide phase modulation information about the first signal, a direct digital synthesizer having an output and configured to modulate a second signal using the phase modulation information and to provide the second signal at the output. The second signal can include a representation of the first signal with a frequency notch at a particular center frequency within the bandwidth of the second signal.

Privacy device for smart speakers
12010487 · 2024-06-11 ·

Systems, apparatuses, and methods are described for a privacy blocking device configured to prevent receipt, by a listening device, of video and/or audio data until a trigger occurs. A blocker may be configured to prevent receipt of video and/or audio data by one or more microphones and/or one or more cameras of a listening device. The blocker may use the one or more microphones, the one or more cameras, and/or one or more second microphones and/or one or more second cameras to monitor for a trigger. The blocker may process the data. Upon detecting the trigger, the blocker may transmit data to the listening device. For example, the blocker may transmit all or a part of a spoken phrase to the listening device.

Speech privacy system and/or associated method
10304473 · 2019-05-28 · ·

Certain example embodiments relate to speech privacy systems and/or associated methods. The techniques described herein disrupt the intelligibility of the perceived speech by, for example, superimposing onto an original speech signal a masking replica of the original speech signal in which portions of it are smeared by a time delay and/or amplitude adjustment, with the time delays and/or amplitude adjustments oscillating over time. In certain example embodiments, smearing of the original signal may be generated in frequency ranges corresponding to formants, consonant sounds, phonemes, and/or other related or non-related information-carrying building blocks of speech. Additionally, or in the alternative, annoying reverberations particular to a room or area in low frequency ranges may be cut out of the replica signal, without increasing or substantially increasing perceived loudness.

System and method for detecting and defeating a drone

A system for detecting and defeating a drone is disclosed which includes a detection antenna array configured to detect the drone and a control signal of the drone in a 360 degree field, the detection antenna array being further configured to detect the directionality of the drone with reference to the most dominant of the control signal of the drone detected by each of a plurality of antennas within the detection antenna array; a neutralization system disposed in communication with the detection antenna array; the neutralization system including a transmission antenna configured to transmit an override signal to the detected drone, an amplifier configured to modulate a gain of the override signal, and a processing device configured to generate the override signal and control transmission of the override signal.

Provision of a secured replica pseudo random noise signal
10225038 · 2019-03-05 · ·

A secure method and a secure provision unit provide a secured replica pseudo random noise signal for a receiver unit. A replica pseudo random noise code is modulated with a noise signal by a receiver-end provision unit. The replica pseudo random noise code has artificially produced noise superimposed thereon, so that the replica pseudo random noise code cannot be read from the noisy signal even at the receiver end, for example within a receiver or on a transmission path between provision unit and receiver.

MAGNETIC DETECTION OF REPLAY ATTACK

A method of detecting a replay attack on a voice biometrics system comprises: receiving an audio signal representing speech; detecting a magnetic field; determining if there is a correlation between the audio signal and the magnetic field; and if there is a correlation between the audio signal and the magnetic field, determining that the audio signal may result from a replay attack.