STACKED DIGITAL CURRENT STEERING AUTOMATIC GAIN CONTROL ATTENUATOR

    公开(公告)号:US20240223147A1

    公开(公告)日:2024-07-04

    申请号:US18147596

    申请日:2022-12-28

    Inventor: Chong Hin Chee

    Abstract: An automatic gain control (AGC) attenuator for an amplifier. In one example, the AGC attenuator includes a first transistor stack including a plurality of first banks of current steering differential transistor pairs and configured to receive a radio frequency (RF) input signal and output a first attenuated RF signal. Each first bank of the plurality of first banks is configured to attenuate the RF input signal by a predetermined value. The AGC attenuator also includes a second transistor stack that includes a plurality of second banks of current steering differential transistor pairs. The second transistor stack is cascoded to the first transistor stack, and is configured to receive the first attenuated RF signal and output a second attenuated RF signal. Each second bank of the plurality of second banks is configured to attenuate the first attenuated RF signal by a predetermined value.

    AUTOMATED DETECTION AND TRACKING OF CONVERSATIONS OF INTEREST IN CROWDED AREAS

    公开(公告)号:US20240221733A1

    公开(公告)日:2024-07-04

    申请号:US18148242

    申请日:2022-12-29

    CPC classification number: G10L15/1822 G10L25/51 H04R3/005

    Abstract: Systems and methods for detecting and tracking conversations of interest in crowded areas. The system includes a plurality of body worn portable public safety communication devices, each including a plurality of microphones and an electronic processor. The electronic processor is configured to generate, using the plurality of microphones, a plurality of beams and scan in parallel, using the plurality of beams, a plurality of simultaneous audio conversations. The electronic processor is configured to identify and isolate a plurality of conversations of interest from among the audio conversations based on predetermined characteristics indicative of a potential threat. The electronic processor is configured to determine that at least two of the plurality of conversations of interest are potentially linked to a single potential threat, compile them for playback or transcription, and generate an alert indicating the availability of the linked conversations of interest.

    DEVICE, SYSTEM, AND METHOD FOR REDUCING MACHINE LEARNING BIAS IN MACHINE LEARNING GENERATED TEXTUAL LISTS OF TIME-STAMPED EVENTS

    公开(公告)号:US20240220850A1

    公开(公告)日:2024-07-04

    申请号:US18090702

    申请日:2022-12-29

    CPC classification number: G06N20/00

    Abstract: A device, system, and method for reducing machine learning bias in machine learning generated textual lists of time-stamped events is provided. The device generates, via a machine learning algorithm, using sensor data related to the incident, a textual list of time-stamped events for an incident, one or more of the events associated with respective machine learning confidence scores. For a given time-stamped event having a respective machine learning confidence score less than a threshold confidence score, the device redacts the given event in the list and replaces it in the list with a field for receiving input, the list of rendered at a display screen with the given event in the list replaced with the field. The device receives, via an input device, input at the field and after receiving the input, un-redacts the given event, and renders, at the display screen, the received input received and the given event.

    SYSTEM AND METHOD FOR COMMUNICATIONS ASSURANCE ANALYSIS

    公开(公告)号:US20240214860A1

    公开(公告)日:2024-06-27

    申请号:US18145030

    申请日:2022-12-22

    CPC classification number: H04W28/0236 H04B17/391 H04W28/0289

    Abstract: Techniques for communications assurance analysis are provided. A communications assurance analysis system retrieves performance points of a plurality of stages of a single radio call. A level of degradation for each stage of the plurality of stages of the single radio call is determined based on the performance points. A visualization of each stage of the single radio call is displayed. The visualization is in order of a communications path between an initiator of the single radio call and at least one recipient of the single radio call. The visualization for each stage of the plurality of stages is based on the level of degradation for the stage.

    STRUCTURED GRAPHICAL USER INTERFACE FOR PUBLIC SAFETY POLICY PROCEDURE MANAGEMENT

    公开(公告)号:US20240211098A1

    公开(公告)日:2024-06-27

    申请号:US18146759

    申请日:2022-12-27

    CPC classification number: G06F3/0482 G06Q50/265

    Abstract: A method for generating a structured graphical user interface (GUI) for improving accuracy of determining violations of public safety policy procedure and effect of such violations on results of an incident includes collecting data pertaining to an incident response and identifying a current public safety policy procedure for an incident type of the incident response. The method also includes detecting one or more actions taken within the incident response falling outside the recommended actions of the current public safety policy procedure and generating a GUI listing a plurality of actions taken during the incident response. The method further includes displaying a recommended action of the current public safety policy procedure corresponding to the one or more actions taken adjacent the one or more actions taken in the GUI and providing a link to the recommended action adjacent the one or more actions taken in the GUI.

    SYSTEM AND METHOD FOR JOINING A SUBSCRIBER DEVICE TO A COMMUNICATIONS NETWORK

    公开(公告)号:US20240196210A1

    公开(公告)日:2024-06-13

    申请号:US18065099

    申请日:2022-12-13

    CPC classification number: H04W12/06 H04W60/04

    Abstract: Techniques for joining a subscriber device to a communications network are provided. A first subscriber device that is registered with a communications network receives a request from a second subscriber device that is not registered with the communications network to join the communications network. The request is received over a wireless link. The first subscriber device sends a request to the communications network for authorization for the second subscriber device to join the communications network. The first subscriber device receives from the communications network authorization for the second subscriber device to join the communications network. The authorization includes a set of connection parameters. The first subscriber device sends the set of connection parameters to the second subscriber device, over the wireless link. The second subscriber device joins the communications network using the connection parameters.

    EXTERNAL ANTENNA FOR PORTABLE COMMUNICATION DEVICE

    公开(公告)号:US20240195055A1

    公开(公告)日:2024-06-13

    申请号:US18063226

    申请日:2022-12-08

    CPC classification number: H01Q1/40 H01Q1/242 H01Q9/32

    Abstract: A method of constructing an antenna of a portable communication device. The method includes wrapping a conductive element around a flexible support, coupling the conductive element and the flexible support to a rigid connector to assemble an antenna core, and coating the antenna core with a room temperature vulcanizing (RTV) silicone layer. The method further includes fitting a first half of a silicone rubber sheath and a second half of a silicone rubber sheath around the antenna core, compression molding the first half of the silicone rubber sheath and the second half of the silicone rubber sheath around the antenna core, and bonding, by the RTV silicone layer, the silicone rubber sheath to the antenna core.

    MULTI-NODE EXPANDABLE CRYPTOGRAPHIC PROCESSING SYSTEM

    公开(公告)号:US20240179000A1

    公开(公告)日:2024-05-30

    申请号:US18060159

    申请日:2022-11-30

    CPC classification number: H04L9/0897 H04L9/0877 H04L2209/12

    Abstract: A system for securely managing a plurality of hardware security modules (HSMs). One example provides a host device, a first HSM, and a second HSM. The host device is configured to designate the first HSM as a primary HSM, and activate a security association mode in the primary HSM. The first HSM is configured to generate a multi-HSM exchange key (“MEK”), and encrypt the MEK using a temporary key generated with a key agreement protocol between the first HSM and the second HSM. The first HSM shares the encrypted MEK with the second HSM via the host device. The host device deactivates the security association mode, and the first HSM receives a traffic encryption key (“TEK”). The first HSM encrypts the TEK using the MEK, and shares the encrypted TEK with the second HSM via the host device. The second HSM decrypts the TEK using the MEK.

Patent Agency Ranking