Class / Patent application number | Description | Number of patent applications / Date published |
380275000 | Speech scrambler detail | 9 |
20080232589 | Robust delivery of packet based secure voice - A method is provided for transmitting voice data in a secure communication system. The method includes: transmitting voice data using a plurality of data packets; embedding a cryptographic message indicator into each of the plurality of data packets; and correcting for bit errors in the cryptographic message indicator at a packet receiver using code-combining across two or more of the data packets. | 09-25-2008 |
20080292102 | QUANTUM KEY DISTRIBUTION SYSTEM AND METHOD - A method and system for transmitting optical clock signals and quantum key signals on a single optical channel, and for reducing quantum bit error rate in a quantum key distribution system. The method includes receiving a multi-photon optical clock signal at an electro-optic switch at a first clock rate. The electro-optic switch may be configured for an interval defined by a second clock rate for generating a single photon quantum key signal. The multi-photon optical clock signal and the single photon quantum key signal may be combined such that the single optical channel transmits the single photon quantum key signal at a first interval and the multi-photon optical clock signal at a second interval. The quantum key signal may be transmitted from a transmitter at a first timing, and detected by a detector at a receiver. An output signal of the detector may be sampled at a second timing that is delayed relative to the first timing for reducing quantum bit error rate. | 11-27-2008 |
20090016531 | Method and system for secured real time protocol in scalable distributed conference applications - A method of providing secured teleconference in a distributed teleconference system including providing one or more servers interconnected in a distributed structure, providing at least two participants which include at least one speaker; where each participant is a listener. Each participant is connected to a server and is associated with a secured teleconferencing application, encrypting the data that is created by the speaker's application, building an authentication tag by the speaker application, transmitting a media packet by the speaker's application to the connected server, checking authentication tag validity by each server that receives a media packet and selectively distributing the media packet if the authentication tag check succeeded and checking authentication tag validity by each listener that receives a media packet and decryption of the encrypted data provided that the authentication tag validity check succeeded. | 01-15-2009 |
20090060193 | DEVICE FOR ENCRYPTED COMMUNICATION - A communication device for encrypted transmission of information via unencrypted transmission paths has at least one loudspeaker, one microphone, one audio processing facility, one encryption facility, and one transmission facility. Information is encrypted by the encryption facility and transmitted via unencrypted transmission paths by the transmission facility by further communication instruments. Thus, flexible use on the basis of the various communication instruments which can be used for encrypted transmission is made possible. | 03-05-2009 |
20100202615 | Encryption of voice and data in a single data stream in a deployable,secure communication system - Separate IP data streams, including both voice (VoIP) and data sources, are routed over a single network data stream, encrypted by a single KIV encryption unit, and transmitted as a single packet data stream including both computer and voice data. Integration of the use of a VoIP data stream, together with data sources, and encrypted through a single serial encryption unit such as a KIV-7 enables the encryption of both voice and data using a single KIV encryption unit. After encryption by the Type 1 encryption unit (e.g., KIV-7) in a remotely deployed, secure communication system, the single encrypted data stream is encapsulated into IP packets. The IP packets are addressed to a distant IP device that removes the encapsulated, encrypted data and passes it to a similar Type 1 KIV device for decryption, and distributed to voice devices and computer devices via another voice-enabled router. | 08-12-2010 |
20120263302 | VOICE COMMUNICATION APPARATUS AND METHOD - A voice transmission apparatus is provided. The voice transmission apparatus includes a voice input unit, an Analog-to-Digital (AD) converter, a transmission synchronization unit, a channel status determination unit, and a transmission unit. The voice input unit receives an analog voice signal corresponding to a communication session. The AD converter converts the analog voice signal into a digital signal. The transmission synchronization unit generates a transmission target signal by respectively assigning a start identifier and an end identifier to the first frame and final frame of the digital signal corresponding to the communication session. The channel status determination unit determines the status of a channel. The transmission unit transmits the transmission target signal over the channel in such a way that the transmission rate of the transmission target signal is set on a communication session basis depending on the status of the channel. | 10-18-2012 |
20140056428 | METHODS AND SYSTEMS FOR SECURELY ACCESSING TRANSLATION RESOURCE MANAGER - The disclosed embodiments relate to systems and methods for securely accessing a phrase table. One or more records in the phrase table are encrypted using a first set of keys. The first set of keys is encrypted using a second key. A decoder module is compiled based on the second key. Thereafter, the one or more encrypted records and/or the decoder module are transmitted to the first computing device at the client side. The first set of encrypted keys is transmitted to a second computing device. The first computing device transmits a request to the first computing device to send an encrypted key. The decoder module decrypts the encrypted key to generate a key. The first computing device uses the key to decrypt one or more encrypted records. | 02-27-2014 |
20140093083 | SYSTEM, DEVICE, AND METHOD FOR SECURING VOICE AUTHENTICATION AND END-TO-END SPEECH INTERACTION - A method, device, and system for secure end-to-end audio recognition is disclosed. A client device launches an application that connects with a server. The client device and server exchange cryptographic keys and establish a secure connection and a shared cryptographic key. The server transmits an encrypted audio prompt to the client device. The client device decrypts the encrypted audio prompt and stores the decrypted audio prompt in secure memory inaccessible to the operating system using an audio engine of the client device. The audio engine then retrieves the audio and renders it for the user through the speakers of the client device. The client device captures the user's audio response with a microphone and stores the audio response in the secure memory. The stored audio response is encrypted and transmitted to the server. | 04-03-2014 |
20150349913 | SYSTEM, DEVICE, AND METHOD FOR SECURING VOICE AUTHENTICATION AND END-TO-END SPEECH INTERACTION - A method, device, and system for secure end-to-end audio recognition is disclosed. A client device launches an application that connects with a server. The client device and server exchange cryptographic keys and establish a secure connection and a shared cryptographic key. The server transmits an encrypted audio prompt to the client device. The client device decrypts the encrypted audio prompt and stores the decrypted audio prompt in secure memory inaccessible to the operating system using an audio engine of the client device. The audio engine then retrieves the audio and renders it for the user through the speakers of the client device. The client device captures the user's audio response with a microphone and stores the audio response in the secure memory. The stored audio response is encrypted and transmitted to the server. | 12-03-2015 |