H04K1/04

Intrusion detection and radio fingerprint tracking
11581962 · 2023-02-14 · ·

A radio transmitter adjusts its radio frequency (RF) fingerprint to defeat RF fingerprinting identification without destroying the content of its transmissions. The radio transmitter comprises a frequency-upconverter configured to upconvert a baseband or intermediate-frequency signal to an RF signal, and an amplifier to amplify the RF signal to produce a transmission signal. An RF fingerprint control circuit changes the non-linear behavior of the frequency-upconverter or the amplifier in order to change the RF fingerprint. The transmitter may create RF fingerprint “personalities” to be paired with different radio protocol behaviors and subscriber terminal identification codes (e.g., MAC addresses or SMSIs) for generating different radio identities.

SYSTEM AND METHOD FOR SIGNAL RE-TRANSMISSION
20220393786 · 2022-12-08 ·

System and for signal re-transmission including a channelizer, a signal-effect-processor and a controller. The signal-ef-fect-processor includes a plurality of sub-band-processors and a summer. The channelizer receives a sampled Intermediate-Frequency signal exhibiting a first sampling-rate. The channelizer produces a plurality of sub-band-signals, each associated with a respective sub-band of the Intermediate-Frequency signal. Each sub-band-signal exhibit a second sampling-rate lower than the first sampling-rate. Each of at least one selected sub-band-processor receives a respective sub-band-signal, introduces at least one effect to the respective sub-band-signal, and increases the sampling-rate of the respective sub-band-signal to the first sampling-rate, thereby producing a respective affected sub-band re-transmit signal. Each selected sub-band-processor is further provides the respective affected sub-band re-transmit signal to a respective input of the summer. The summer sums the inputs thereof to produce a wideband affected re-transmit signal. The controller selects the selected sub-band processor and controls settings of the at least one effect.

ROBUST CODE / DATA HIDING METHOD AGAINST ANALOG TRANSMISSION (OVER THE AIR) FOR DIGITAL AUDIO

The present invention is relates a robust code/data hiding method against analog transmission (over the air) for digital audio, secret code/data hiding component to digital audio file and extracting the hidden code/data from the covered sound, which a digital audio where a secret code/data is embedded is played from the loudspeakers in any environment and media player, the digital audio is received by the user mobile phone or mobile device microphone without being affected by the distorting effects of the analog transmission medium and the noise in any way, enabling follow-up information based on user interaction and user product experience. The present invention can be used in many areas such as the participation of users in a campaign via mobile phone, increasing the TV/radio viewing rate (rating) & follow-ups, copyright tracking & management, participating in sweepstakes, distributing instant coupons, authentication and delivering advertisements to target customer groups.

ROBUST CODE / DATA HIDING METHOD AGAINST ANALOG TRANSMISSION (OVER THE AIR) FOR DIGITAL AUDIO

The present invention is relates a robust code/data hiding method against analog transmission (over the air) for digital audio, secret code/data hiding component to digital audio file and extracting the hidden code/data from the covered sound, which a digital audio where a secret code/data is embedded is played from the loudspeakers in any environment and media player, the digital audio is received by the user mobile phone or mobile device microphone without being affected by the distorting effects of the analog transmission medium and the noise in any way, enabling follow-up information based on user interaction and user product experience. The present invention can be used in many areas such as the participation of users in a campaign via mobile phone, increasing the TV/radio viewing rate (rating) & follow-ups, copyright tracking & management, participating in sweepstakes, distributing instant coupons, authentication and delivering advertisements to target customer groups.

OPTICAL COMMUNICATION SYSTEM USING MODE-LOCKED FREQUENCY COMB AND ALL-OPTICAL PHASE ENCODING FOR SPECTRAL AND TEMPORAL ENCRYPTED AND STEALTHY TRANSMISSION, AND FOR OPTICAL PROCESSING-GAIN APPLICATIONS
20220360337 · 2022-11-10 ·

A method for transmitting data carrying optical information over an optical channel, comprising the steps of providing an optical transmitter consisting of a light source being a Mode-Locked Optical Frequency Comb (MLFC) for generating a frequency comb of multiple carriers, each of which being modulated by a baseband signal; an optical modulator for modulating each and all of the multiple carriers in a modulation bandwidth extending up to the modes' frequency spacing between the multiple carriers; performing all-optical encoding of the modulated carriers by manipulating the optical amplitude and/or phase and/or polarization of all optically modulated carriers; and transmitting, by the optical transmitter, the encoded modulated carriers to an optical receiver, over an optical channel

COMMUNICATIONS SYSTEM
20220360359 · 2022-11-10 ·

Examples described herein relate to a network interface device that includes first circuitry to perform a first scrambling operation on input data; second circuitry to perform a second scrambling operation on the input data; and third circuitry to select the second scrambled input data based on the first scrambled input data including a data sequence that is associated with receiver malfunction and the second scrambled input data including the data sequence that is associated with receiver malfunction.

COMMUNICATIONS SYSTEM
20220360359 · 2022-11-10 ·

Examples described herein relate to a network interface device that includes first circuitry to perform a first scrambling operation on input data; second circuitry to perform a second scrambling operation on the input data; and third circuitry to select the second scrambled input data based on the first scrambled input data including a data sequence that is associated with receiver malfunction and the second scrambled input data including the data sequence that is associated with receiver malfunction.

APPARATUS AND METHOD FOR GENERATING JAMMING SIGNAL, COMMUNICATION SYSTEM
20220353008 · 2022-11-03 ·

This application relates to an apparatus and method for generating a jamming signal, and a communication system. In one aspect, the method may include converting binary bits of a first communication signal to be transmitted and obtaining at least one codeword matched previously to the binary bits. The method may also include generating a second communication signal by superimposing a first conversion signal being obtained by converting the first communication signal to an up-chirp signal and a second conversion signal being obtained by converting the first communication signal to a down-chirp signal. The method further include generating a pseudo jamming signal by computing the second communication signal and the codeword.

Voice morphing apparatus having adjustable parameters
11600284 · 2023-03-07 · ·

A voice morphing apparatus having adjustable parameters is described. The disclosed system and method include a voice morphing apparatus that morphs input audio to mask a speaker's identity. Parameter adjustment uses evaluation of an objective function that is based on the input audio and output of the voice morphing apparatus. The voice morphing apparatus includes objectives that are based adversarially on speaker identification and positively on audio fidelity. Thus, the voice morphing apparatus is adjusted to reduce identifiability of speakers while maintaining fidelity of the morphed audio. The voice morphing apparatus may be used as part of an automatic speech recognition system.

Home automation having user privacy protections

An acoustic sensor is positioned in an environment and configured to generate a data stream responsive to acoustic energy in the environment. A controller is configured to receive the data stream. The controller is further configured to analyze the data stream to determine ambient acoustic signals. The controller is further configured to generate an ambient acoustic template based on the determined ambient acoustic signals. The controller is further configured to apply the ambient acoustic template to the data stream so that the ambient acoustic signals are suppressed in the data stream. The controller is further configured to analyze the data stream after the ambient acoustic signals are suppressed in order to determine if the acoustic energy in the environment includes acoustic energy of human snoring. The controller is further configured to issue a control signal to a second controller in order to engage a home automation device.