H04M1/505

Systems and methods for content delivery and management

A content management method uses a portable multifunction device 202 to detect human-inaudible acoustic signals 210, when that signal is heard from the surrounding environment by a device microphone 113 or is output by the device's audio circuitry 100. The device 202 extracts a code from the inaudible signal and supplies the code via wired or wireless communication 232, along with additional optional data regarding the device and/or its user, to a content management system 200. Upon receipt of the code, indicating the received inaudible signal 210 from the portable multifunction device 202, the content management system 200 may provide particular content or a pointer to that content to the portable multifunction device 202, the content being selected based on the particular inaudible signal received. Additional threshold triggers 502 may be delivered to require additional actions to unlock the content.

Access control and validation using sonic tones
11074033 · 2021-07-27 · ·

Controlled access to a physical area or secured service is managed using sonic tones. A secret key is stored in a user device and in a security system, and then when access is desired, the secret key or a derivative thereof is encoded into a sonic tone which is transmitted. The sonic tone is received and decoded to obtain the encoded binary message, which is then compared to an expected binary message, and if there is a match, access is granted by the security system. In illustrated particular embodiments the secret key is used to generate a one-time password based upon the secret key and a randomizing factor, such as the current time.

Mobile terminal for automatically making a telephone conversation using artificial intelligence
10742808 · 2020-08-11 · ·

A first mobile terminal includes a microphone to receive a voice, a mobile communication module to make communication with a second mobile terminal, and a learning data unit to receive a command for entering an artificial intelligence (AI) telephone conversation mode, to obtain a user intent of the first mobile terminal, based on the received command, and to automatically perform a first task with the second mobile terminal according to the obtained user intent.

Mobile terminal
10404857 · 2019-09-03 · ·

A first mobile terminal includes a microphone to receive a voice, a mobile communication module to make communication with a second mobile terminal, and a learning data unit to receive a command for entering an artificial intelligence (AI) telephone conversation mode, to obtain a user intent of the first mobile terminal, based on the received command, and to automatically perform a first task with the second mobile terminal according to the obtained user intent.

MOBILE TERMINAL
20190208057 · 2019-07-04 · ·

A first mobile terminal includes a microphone to receive a voice, a mobile communication module to make communication with a second mobile terminal, and a learning data unit to receive a command for entering an artificial intelligence (AI) telephone conversation mode, to obtain a user intent of the first mobile terminal, based on the received command, and to automatically perform a first task with the second mobile terminal according to the obtained user intent.

MOBILE TERMINAL
20190158665 · 2019-05-23 · ·

A first mobile terminal includes a microphone to receive a voice, a mobile communication module to make communication with a second mobile terminal, and a learning data unit to receive a command for entering an artificial intelligence (AI) telephone conversation mode, to obtain a user intent of the first mobile terminal, based on the received command, and to automatically perform a first task with the second mobile terminal according to the obtained user intent.

ACCESS CONTROL AND VALIDATION USING SONIC TONES

Controlled access to a physical area or secured service is managed using sonic tones. A secret key is stored in a user device and in a security system, and then when access is desired, the secret key or a derivative thereof is encoded into a sonic tone which is transmitted. The sonic tone is received and decoded to obtain the encoded binary message, which is then compared to an expected binary message, and if there is a match, access is granted by the security system. In illustrated particular embodiments the secret key is used to generate a one-time password based upon the secret key and a randomizing factor, such as the current time.

All-digital phase locked loop (ADPLL) including a digital-to-time converter (DTC) and a sampling time-to-digital converter (TDC)

A digital phase locked loop (DPLL) circuit includes a digital-to-time converter (DTC) configured to generate a delayed reference clock signal by delaying a reference clock signal according to a delay control signal and a time-to-digital converter (TDC) coupled to an output of the DTC. The TDC is configured to sample a value of a transition signal according to the delayed reference clock signal and to generate an output signal indicating a phase difference between the delayed clock signal and an input clock signal. A method of controlling a DPLL includes delaying a reference clock signal according to a delay control signal, sampling a value of a transition signal according to the delayed reference clock signal, generating an output signal indicating a phase difference between the delayed clock signal and an input clock signal, and generating a digitally controlled oscillator (DCO) clock signal according to the output signal.

ALL-DIGITAL PHASE LOCKED LOOP (ADPLL) INCLUDING A DIGITAL-TO-TIME CONVERTER (DTC) AND A SAMPLING TIME-TO-DIGITAL CONVERTER (TDC)
20170205772 · 2017-07-20 ·

A digital phase locked loop (DPLL) circuit includes a digital-to-time converter (DTC) configured to generate a delayed reference clock signal by delaying a reference clock signal according to a delay control signal and a time-to-digital converter (TDC) coupled to an output of the DTC. The TDC is configured to sample a value of a transition signal according to the delayed reference clock signal and to generate an output signal indicating a phase difference between the delayed clock signal and an input clock signal. A method of controlling a DPLL includes delaying a reference clock signal according to a delay control signal, sampling a value of a transition signal according to the delayed reference clock signal, generating an output signal indicating a phase difference between the delayed clock signal and an input clock signal, and generating a digitally controlled oscillator (DCO) clock signal according to the output signal.