Patent classifications
H04K3/46
DETECTION OF REPLAY ATTACK
In order to detect a replay attack in a speaker recognition system, at least one feature is identified in a detected magnetic field. It is then determined whether the at least one identified feature of the detected magnetic field is indicative of playback of speech through a loudspeaker. If so, it is determined that a replay attack may have taken place.
System and method for signal re-transmission
System and for signal re-transmission including a channelizer, a signal-effect-processor and a controller. The signal-effect-processor includes a plurality of sub-band-processors and a summer. The channelizer receives a sampled Intermediate-Frequency signal exhibiting a first sampling-rate. The channelizer produces a plurality of sub-band-signals, each associated with a respective sub-band of the Intermediate-Frequency signal. Each sub-band-signal exhibit a second sampling-rate lower than the first sampling-rate. Each of at least one selected sub-band-processor receives a respective sub-band-signal, introduces at least one effect to the respective sub-band-signal, and increases the sampling-rate of the respective sub-band-signal to the first sampling-rate, thereby producing a respective affected sub-band re-transmit signal. Each selected sub-band-processor is further provides the respective affected sub-band re-transmit signal to a respective input of the summer. The summer sums the inputs thereof to produce a wideband affected re-transmit signal. The controller selects the selected sub-band processor and controls settings of the at least one effect.
SPEECH PRIVACY SYSTEM AND/OR ASSOCIATED METHOD
Certain example embodiments relate to speech privacy systems and/or associated methods. The techniques described herein disrupt the intelligibility of the perceived speech by, for example, superimposing onto an original speech signal a masking replica of the original speech signal in which portions of it are smeared by a time delay and/or amplitude adjustment, with the time delays and/or amplitude adjustments oscillating over time. In certain example embodiments, smearing of the original signal may be generated in frequency ranges corresponding to formants, consonant sounds, phonemes, and/or other related or non-related information-carrying building blocks of speech. Additionally, or in the alternative, annoying reverberations particular to a room or area in low frequency ranges may be cut out of the replica signal, without increasing or substantially increasing perceived loudness.
SPEECH PRIVACY SYSTEM AND/OR ASSOCIATED METHOD
Certain example embodiments relate to speech privacy systems and/or associated methods. The techniques described herein disrupt the intelligibility of the perceived speech by, for example, superimposing onto an original speech signal a masking replica of the original speech signal in which portions of it are smeared by a time delay and/or amplitude adjustment, with the time delays and/or amplitude adjustments oscillating over time. In certain example embodiments, smearing of the original signal may be generated in frequency ranges corresponding to formants, consonant sounds, phonemes, and/or other related or non-related information-carrying building blocks of speech. Additionally, or in the alternative, annoying reverberations particular to a room or area in low frequency ranges may be cut out of the replica signal, without increasing or substantially increasing perceived loudness.
SPEECH PRIVACY SYSTEM AND/OR ASSOCIATED METHOD
Certain example embodiments relate to speech privacy systems and/or associated methods. The techniques described herein disrupt the intelligibility of the perceived speech by, for example, superimposing onto an original speech signal a masking replica of the original speech signal in which portions of it are smeared by a time delay and/or amplitude adjustment, with the time delays and/or amplitude adjustments oscillating over time. In certain example embodiments, smearing of the original signal may be generated in frequency ranges corresponding to formants, consonant sounds, phonemes, and/or other related or non-related information-carrying building blocks of speech. Additionally, or in the alternative, annoying reverberations particular to a room or area in low frequency ranges may be cut out of the replica signal, without increasing or substantially increasing perceived loudness.
Detection and protection against jam intercept and replay attacks
Method and apparatus are disclosed for detection and protection against jam intercept and replay attacks. An example disclosed key fob includes a first wireless transceiver tuned to communicate via a first frequency band, second wireless transceiver tuned to communicate via a second frequency band, and a communicator. The first frequency band is different than the second frequency band. The example communicator sends a first message via the first wireless transceiver in response to activation of a first button. Additionally, the example communicator, in response to not receiving a second message via the second wireless transceiver, provides an alert.
Systems and methods for detecting and controlling transmission devices
A method of detecting, controlling and managing transmission of a transmitting device within a facility is disclosed. The method involves transmitting information to the transmission device at a power greater than a power of an available base station covering the facility, detecting a response transmission from the transmission device by a least one transmission detection facility, extracting identification information associated with the transmission device in response to the transmitted information; and determining a location of the transmission device based on the response transmission received by the at least one received transmission detection facility, wherein the response transmissions are sorted by the identification information, determining an allowability of the located transmission device with the set area and interacting and manipulating transmission of the detected transmitting device.
Masking Open Space Noise Using Sound and Corresponding Visual
Methods and apparatuses for addressing open space noise are disclosed. In one example, a method for masking open space noise includes outputting from a speaker a speaker sound corresponding to a flow of water, and displaying a water element system, the water element system generating a sound of flowing water.
Biometrics-based dynamic sound masking
Apparatus having corresponding methods and computer-readable media comprises: a speaker configured to provide a masking sound to an individual; a biometric sensor configured to collect biometric data from the individual; and a controller configured to modify the masking sound based on the biometric data.
Expanding time window for remote commands
A vehicle includes: receiver(s), a timer counting time, memory, and processor(s) configured to: receive a timestamped signal from a fob; compare the timestamp to a time window; reject the timestamp if the timestamp is outside the time window; expand the time window with the counted time; compute the time window as a trigonometric function of the counted time and a predetermined angle.