Abstract:
An electronic device for generating a masking signal is described. The electronic device includes a plurality of microphones and a speaker. The electronic device also includes a processor and executable instructions stored in memory that is in electronic communication with the processor. The electronic device obtains a plurality of audio signals from the plurality of microphones. The electronic device also obtains an ambience signal based on the plurality of audio signals. The electronic device further determines an ambience feature based on the ambience signal. Additionally, the electronic device obtains a voice signal based on the plurality of audio signals. The electronic device also determines a voice feature based on the voice signal. The electronic device additionally generates a masking signal based on the voice feature and the ambience feature. The electronic device further outputs the masking signal using the speaker.
Abstract:
An electronic device for generating a masking signal is described. The electronic device includes a plurality of microphones and a speaker. The electronic device also includes a processor and executable instructions stored in memory that is in electronic communication with the processor. The electronic device obtains a plurality of audio signals from the plurality of microphones. The electronic device also obtains an ambience signal based on the plurality of audio signals. The electronic device further determines an ambience feature based on the ambience signal. Additionally, the electronic device obtains a voice signal based on the plurality of audio signals. The electronic device also determines a voice feature based on the voice signal. The electronic device additionally generates a masking signal based on the voice feature and the ambience feature. The electronic device further outputs the masking signal using the speaker.
Abstract:
A Management System (MS) manages signing privileges for entities desiring cryptographic signatures, and a Certificate Authority (CA) provides a cryptographic signing service. MS registers entities for the cryptographic signing service, determines signing privileges for each entity, and processes requests from entities for signatures. For registration, MS obtains registration information for the entity and invokes CA to generate an identity certificate for the entity. This identity certificate contains cryptographic information used to uniquely identify the entity. For signature generation, MS receives a request for a signature from the entity, authenticates the entity, authorizes or denies the request based on the signing privileges stored for the entity, and invokes CA to generate the signature if the signature is authorized. CA provides the cryptographic signing service and generates signatures and certificates as directed by MS.
Abstract:
An electrical cable includes a sheath that envelops at least two internal conductors, and an indicia visible on the sheath is representative of the internal conductor.
Abstract:
A method and apparatus for controlling a discontinuous transmission process. Audio information is digitized and provided to a vocoder. A voice activity level is determined from the digitized audio signal, and if voice activity is present, active vocoder frames are generated at a predetermined output rate. If voice activity is not detected, inactive vocoder frames are generated. During transitions between periods of speech activity and speech inactivity, transition frames are generated, the transition frames comprising background noise information.
Abstract:
Motion estimation in video compressions systems. A programmable motion estimator may be used to estimate a motion vector for a macroblock in a current frame by searching for a matching macroblock in a previous frame. A controller may be used to program the motion estimator to perform a particular search.
Abstract:
In general, the invention is directed to techniques for directly acquiring P-codes without first acquiring C/A-codes. For example, in one embodiment, a system comprises an assist server to track a P-code signal from a Global Positioning System (GPS) satellite and generate acquisition assistance information from the signal. The system further comprises a mobile unit to receive the acquisition assistance data from the assist server, and to acquire the P-code signal from the satellite based on the acquisition assistance data. The acquisition assistance data may include time-of-week data indicating an initial time offset into a P-code pseudorandom code sequence for the satellite. The mobile unit may include a reference generator to locally generate a reference pseudorandom code sequence based on the time-of-week data.
Abstract:
Techniques for associating software with hardware using cryptography are described. The software is identified by a software identifier (ID), and the hardware is identified by a hardware ID. The software is hashed to obtain a code digest. A code signature is generated for the code digest, software ID, and hardware ID. A code image is formed with the software, software ID, code signature, and a certificate. The certificate contains cryptographic information used to authenticate the certificate and validate the code signature. The code image is loaded onto a device. The device validates the software to hardware association prior to executing the software. For the validation, the device authenticates the certificate with a certificate authority public key embedded within the device. The device also validates the code signature using the cryptographic information contained in the certificate, information in the code image, and the hardware ID embedded within the device.
Abstract:
A system and method for providing a secure environment for mobile telephones and other devices are disclosed. The system and method may utilize trust zoning, layered memory, and a secure matrix model having, for example, a memory protection module for protecting memory; a secure debug module for ensuring security of the debug module; a secure file system module for protecting the secure file system; and a trusted time source module for protecting components. Embodiments of the present invention may protect against security attacks on a variety of hardware and software components while permitting suitable levels of accessibility for developmental and maintenance purposes.
Abstract:
This disclosure is directed to encoding techniques that can be used to improve encoding of digital video data. The techniques can be implemented by an encoder of a digital video device in order to reduce the number of computations and possibly reduce power consumption during video encoding. More specifically, video encoding techniques are described which utilize one or more programmable thresholds in order to terminate the execution of various computations when the computations would be unlikely to improve the encoding. By terminating computations prematurely, the amount of processing required for video encoding can be reduced, and power can be conserved.