Abstract:
Anti-pharming techniques in wireless computer networks at pre-IP state are disclosed. A user computer connecting to a wireless computer network may include an anti-pharming module configured to monitor data communications to and from a wireless access point of the wireless computer network. The anti-pharming module may be configured to determine if data communication going in a direction from the wireless access point to the user computer originated from a wireless station rather than a server configured to dynamically provide network addresses to computers connecting to the wireless computer network. The wireless station may be deemed a malicious computer perpetrating a pharming attack when it originated the data communication and is responding to a request to obtain network address previously sent by the user computer.
Abstract:
A formant tracker for receiving an analog speech signal and generating indicia representative of the formant. A pitch tracker determines the fundamental frequency of the analog speech input. The fundamental frequency is used to control a sinusoidal oscillator in the generation of a sinusoidal signal which when combined with the analog speech input generates a convolution over the chosen formant frequency. The process is repeated for each integer multiple of the fundamental frequency, thereby changing the sinusoidal oscillator. The optimal integer multiple is chosen which generates the formant identification. The optimal integer is also used to generate an appropriate bandwidth. Three formant frequency ranges are used to define human speech. The optimal integers for the other two formant identifications and the appropriate bandwidths are similarly determined. The three optimal integer values are combined with the fundamental frequency to get the three formant values and their associated bandwidths. These formant values and their bandwidths together with the fundamental frequency are communicated as output so as to identify in formant form the analog signal.
Abstract:
An electronic, speech producing system receives allophonic codes and produces speech-like sounds corresponding to these codes, through a loud speaker. A micro-controller controls the retrieval, from a read-only memory, of digital signals representative of individual allophone parameters. The addresses at which such allophone parameters are located are directly related to the allophonic code. A dedicated microcontroller concatenates the digital signals representative of the allophone parameters, including code indicating stress and intonation patterns for the allophones. The allophones are divided into a plurality of frames with one digital position indicating whether the frame is the last frame in the allophone, in which event an extra frame is introduced to provide smoothing between allophones when no stop is present and when the present allophone is voiced and the subsequent allophone is voiced, or when the present allophone is unvoiced and the subsequent allophone is unvoiced. An LPC speech synthesizer receives the digital signals and provides analog signals corresponding thereto to the loud speaker to produce speech-like sounds with stress and intonation.
Abstract:
A scan client in a subnet of an intranet may be designated as a root agent to provide subnet information to a scan server in the intranet. The subnet information may include addresses of computers belonging to the subnet. The scan server may use subnet information collected from various root agents to build a map of the intranet. The intranet map may be forwarded from the scan server to the root agents, which in turn provide the intranet map to scan clients in their respective subnets. The root agents may also receive antivirus modules from the scan server for distribution to scan clients. A scan client may look for computers indicated in the intranet map to determine whether or not it is connected to the intranet.
Abstract:
A text-to-speech synthesis system receives digital code representative of characters from a local or remote source, and converts those character codes into speech. A set of allophone rules is contained in a memory and each incoming character set is matched with the proper character set to describe the sound of that particular character set. A microcontroller is dedicated to the comparison procedure which provides allophonic code when a match is made. The allophonic code is provided to a speech producing system which has a system microcontroller for controlling the retrieval, from a read-only memory, of digital signals representative of the individual allophone parameters. The addresses at which such allophone parameters are located are directly related to the allophonic code. A dedicated microcontroller concatenates the digital signals representative of the allophone parameters, including code indicating stress and intonation patterns for the allophones. An LPC speech synthesizer receives the digital signals and provides analog signals corresponding thereto to a loud speaker to produce speech-like sounds with stress and intonation.
Abstract:
An electronic apparatus for translation from a host language to a non-host language in which the individual word is evaluated as to its contextual meaning. The sequence of words, typically a sentence, within the host language, which is communicated to the electronic apparatus is translated, through a recognition device into a series of recognized words. These recognized words are further refined through analysis of their contextual meaning within the sequence (sentence) so as to differentiate between words of similar pronunciation and between homonyms. The present invention permits the direct entry, from voice, to a translator to a foreign language or alternatively to control language for use with an electronic or electromechanical apparatus.
Abstract:
Client computers may be configured to communicate with a security server computer to receive access point information for computer network wireless access points in a particular geographic location. A client computer may provide its current geographic location to the security server computer to request access point information. The server computer may retrieve from an access point database access point information for computer network wireless access points in the geographic location. The server computer may provide the access point information to the client computer, which may display the access point information over a geographic map. The access point information may indicate whether any computer network wireless access point in the geographic location poses a computer security threat.
Abstract:
A virtualization platform includes a number of virtual machines, one of which is configured as a driver domain and includes the network service control for routing network traffic between the other virtual machines. The privileged domain does not include the network service control. The network service control includes network backend interfaces and a virtual switch or bridge. The driver domain includes a PCI driver for direct communication with a network interface card. The driver domain includes hooking software and an inspection agent. Packets passing between the other virtual machines pass through the driver domain, are hooked, and are inspected by inspection agent to determine if they are malicious or not. Malicious packets are blocked. The driver domain may also utilize a PCI driver of the privileged domain for access to the network interface card. Platforms with or without pass-through mode may be used.
Abstract:
To protect a user computer from eavesdroppers, a secure communication connection is created through a computer network. The secure communication connection may be created even when the user computer communicates with a web server computer that does not support secure communication connections. The secure communication connection may be to a protection server computer. Another communication connection may be formed between the protection server computer and the web server computer to allow the user computer to transfer data to the web server computer by way of the protection server computer. The creation of the secure communication connection may be by user request or automatic upon detection of protected address or data.
Abstract:
An electronic apparatus in which the operator inputs both the textual material and a sequence of pitches which upon synthesization simulates singing qualities. The operator inputs a textual material, typically through a keyboard arrangement, and also a sequence of pitches as the tune of the desired song. The text is broken into syllable components which are matched to each note of the tune. The syllables are used to generate control parameters for the synthesizer from their allophonic components. The invention allows the entry of text and a pitch sequence so as to simulate electronically the singing of a tune.