Patents Issued in February 14, 2008
-
Publication number: 20080037759Abstract: Methods and systems are presented for implementing wireless number portability in a wireless communications network, in which an originating switching component determines whether a called number is ported or not based on profile information from a home location register without querying a number portability database.Type: ApplicationFiled: July 19, 2006Publication date: February 14, 2008Applicant: LUCENT TECHNOLOGIES INC.Inventors: Frances Mu-Fen Chin, Peggy Hasan, Huixian Song, Sandra Lynn True
-
Publication number: 20080037760Abstract: The present invention provides a call flow staffing estimation tool. A method in accordance with the present invention includes: generating a staffing impact chart for a future period of time based on historical call volume data to a call center, a schedule of agents servicing the call center, and an average handing time of calls to the call center by the agents; selectively changing an input to the generating step; and immediately updating the staffing impact chart to reflect the change.Type: ApplicationFiled: June 28, 2006Publication date: February 14, 2008Inventors: James N. Boughton, Salvatore Cino, Charles R. Simmons
-
Publication number: 20080037761Abstract: A system, method, and computer readable medium for remotely monitoring call center statistics, that comprises, monitoring virtual automated call distribution connection status of an agent, scanning agent desktop environment connection status of the agent, surveying server logon status of the agent, auditing computer schedule status of the agent, observing network throughput status of the agent, scoring the call center statistics based upon the monitored virtual automated call distribution connection status, the scanned agent desktop environment connection status, the surveyed server logon status, the audited computer schedule status and the observed network throughput status, and displaying the scored call center statistics by agent.Type: ApplicationFiled: June 28, 2006Publication date: February 14, 2008Applicant: West CorporationInventors: Jeffrey William Cordell, Jereomy K. Frum
-
Publication number: 20080037762Abstract: Disclosed are apparatus and methods for utilizing the camera or video capability of particular communication devices, such as cell phones, to enhance handling of calls, such as emergency calls. In one implementation, when a call is made to an emergency response center (ERC) using an image/video capable communication device is queued until an agent is available for handling the call, one or more images or video may be collected from such caller by utilizing the image/video capability of the caller's communication device. The images collected from a plurality of different callers may then be sorted into different event groups. For instance, all the images/video that relate to a same emergency event, such as a traffic accident, are grouped together into a same event group. The different groups can then be prioritized for handling by an available agent. Additionally, the individual callers for each group may also be prioritized based on the collected images/video, e.g.Type: ApplicationFiled: July 11, 2006Publication date: February 14, 2008Inventors: Shmuel Shaffer, Labhesh Patel, Mukul Jain, Sanjeev Kumar
-
Publication number: 20080037763Abstract: A method and system to process communications in an automatic communication distributor is described. The method may comprise receiving a communication and identifying an originating location from which the communication originates. Thereafter, a determination is made when the originating location corresponds to a predefined high priority geographical area and a priority to the communication is assigned based on the originating location. The call may be assigned a higher priority when the originating location corresponds to the high priority geographical area than when the originating location does not correspond with the high priority geographical area. The communication is queued based on the assigned priority. A method is also provided to assign an agent using an automated call distributor based on a distance between the originating location of the communication and the determined geographical locations of the potential respondents.Type: ApplicationFiled: July 26, 2006Publication date: February 14, 2008Inventors: Shmuel Shaffer, Labhesh Patel, Mukul Jain, Sanjeev Kumar
-
Publication number: 20080037764Abstract: In one embodiment, a method includes detecting termination of a first connection between a first caller and a first agent during a communication session between the first caller and the first agent. The method also includes storing information indicating a state of the communication session at the termination of the first connection, and communicating the information to the first agent or to a second agent in response to establishment of a second connection between the first caller and the first agent or the second agent to facilitate a continuation of the communication session.Type: ApplicationFiled: July 31, 2006Publication date: February 14, 2008Applicant: CISCO TECHNOLOGY, INC.Inventors: ERIC H. LEE, FADI R. JABBOUR, DAVID C. LEE, JOHNNY H. LEE
-
Publication number: 20080037765Abstract: A keypad (1200) includes a plurality of keys (1202) and a plurality of key dividers (1204-1210) wherein each of the key dividers includes a plurality of raised guide portions (1212-1214) and at least one tactile cue portion (1214) that is interposed between the plurality of raised guide portions (1212-1214). In one example, the keypad (1200) is a bell keypad and is made up of an elastomeric substrate (44) that includes the key dividers (1212-1214), a keypad dome array (48) that supports the silicone substrate (44) and a keypad sheet (36), such as a top sheet of a front assembly, having keypad indicia thereon and slots operatively sized to receive the plurality of key dividers.Type: ApplicationFiled: July 24, 2006Publication date: February 14, 2008Applicant: Motorola, Inc.Inventors: Mark D. Finney, Steve C. Emmert
-
Publication number: 20080037766Abstract: An uncomfortable feeling due to lack of the speech of a far end speaker and a convergence signal voice (sound) is prevented, and the echo of the far end speaker is removed. A pseudo signal generating circuit has a phase inverter (10) for inverting the phase of a signal, a pseudo hybrid circuit (11) for generating a pseudo echo having the same or substantially the same characteristic as that of the true signal, and a pseudo telephone set (5-2). By generating a pseudo echo having the phase opposite to that of the true signal and having the same or substantially the same characteristics as that of the true signal, the uncomfortable signals (echo, etc.) are cancelled out. When a telephone set is connected to a caller or when an extension transfer occurs, an adaptive filter convergence signal is generated for a predetermined constant time only during “no-voice (sound) (silence)” of the far end speaker's signal.Type: ApplicationFiled: April 7, 2005Publication date: February 14, 2008Inventor: Masashi Takada
-
Publication number: 20080037767Abstract: A stand for a handset having a display is provided. The stand consists of a fixed portion and an adjustable portion coupled to the fixed portion. The adjustable portion is operable to receive the handset and operable for adjustment of a viewing angle of the handset.Type: ApplicationFiled: July 26, 2006Publication date: February 14, 2008Inventors: Mark Solon Kanjitsu Gullickson, Naoki Shimada, Erik Raymond Chin
-
Publication number: 20080037768Abstract: A microphone module. The module comprises a carrier having a first side and an opposing second side and comprising a through hole. A microphone is disposed on the first side of the carrier and corresponding to the through hole. A processing chip is disposed on the first side of the carrier and coupled to the microphone. An encapsulant is disposed on the first side of the carrier to encapsulate the microphone and the processing chip.Type: ApplicationFiled: July 17, 2006Publication date: February 14, 2008Applicant: FORTEMEDIA, INC.Inventors: Wei-Chan Hsu, Li-Te Wu, Bing-Ming Ho
-
Publication number: 20080037769Abstract: A substrate (56) for a handset device (10) includes a keypad contact array (108) on the substrate (56) and a display electrode pattern (604) on the substrate (56). In addition, in one example, the substrate (56) for a handset device (10) may include a first surface and a second surface. A keypad contact array (108) and a display electrode pattern (604) may be included on the first surface (96) of the substrate (56). A display (52) may be operatively coupled to the display electrode pattern (604). A portion of the substrate (56) may define at least a portion of an audio port (274).Type: ApplicationFiled: July 24, 2006Publication date: February 14, 2008Applicant: Motorola, Inc.Inventors: Steve C. Emmert, John P. Boos
-
Publication number: 20080037770Abstract: A handset device (10) includes a laminated front sub-assembly (15) and a rear housing (20) supporting the laminated front sub-assembly. In addition, in one example, an integrated circuit substrate (24), a battery (28), and a speaker (32) are held adjacent to each other in a non-stacked arrangement in the rear housing. In one example, the laminated front sub-assembly may include a sheet (32) having operative indicia coupled therewith and a user interface substrate (56) operatively coupled to the sheet. The laminated front assembly 15 can also include a display (52), such as an electrophoretic display, held between the user interface substrate (56) and the sheet (32).Type: ApplicationFiled: July 24, 2006Publication date: February 14, 2008Applicant: Motorola, Inc.Inventor: Steve C. Emmert
-
Publication number: 20080037771Abstract: A handset device (10) includes a substrate (56) defining a first audio port portion (78) and having a contact pad (266). An adhesive (60) is operatively coupled to the substrate (56). The adhesive (60) defines a second audio port portion (276) stacked with the first audio port portion (278) and defines a first electrical port portion (262). A speaker (32) having an electrical connector (238) is operatively coupled to the contact pad (266) through the first electrical port portion (262). The adhesive (60) is operative to seal the first and second audio port portions (278 and 276) from the electrical port portion (262). In addition, in one example, the handset device (10) may include a substrate (56) defining a first audio port portion (278), a speaker (32) operatively coupled to the substrate (56), and a rear housing (20) operatively coupled to the substrate (56) and defining an audio cavity (1104).Type: ApplicationFiled: July 24, 2006Publication date: February 14, 2008Inventors: Greg R. Black, Steve C. Emmert, Yi-Lin Pei
-
Publication number: 20080037772Abstract: A telephone interface circuit comprising a speech circuit, a control circuit turning on upon receiving a supply of a forward direction trigger current so as to connect first and second telephone lines and the speech circuit, and going off upon receiving a supply of a reverse direction trigger current so as to disconnect the first and second telephone lines and the speech circuit, a capacitor charging and discharging charge supplied from the first telephone line, and a hook switch supplying charge accumulated at the capacitor when off-hook to the control circuit as a forward direction trigger current, and supplying charge discharged from the capacitor when on-hook to the control circuit as a reverse direction trigger current.Type: ApplicationFiled: July 6, 2006Publication date: February 14, 2008Inventor: Yoshinobu Fujiwara
-
Publication number: 20080037773Abstract: A telephone interface circuit comprises a first transistor for controlling opening and closing between a speech circuit and subscriber lines, a second transistor for controlling the first transistor to turn on and off, a positive feedback circuit connecting a collector terminal of the first transistor and a base terminal of the second transistor, an overcurrent detection circuit detecting overcurrent applied to the subscriber lines, and a breaker circuit for turning off the first transistor by lowering the base potential of the second transistor to a low potential when overcurrent is detected at the overcurrent detection circuit. Here, the base terminal of the first transistor and a collector terminal of the second transistor are connected. Further, when off-hook, the base potential of the second transistor is controlled in such a manner as to become a high potential by a microcomputer.Type: ApplicationFiled: July 6, 2006Publication date: February 14, 2008Inventor: Yoshinobu Fujiwara
-
Publication number: 20080037774Abstract: The invention provides techniques for secure messages transmission using a public key system to exchange secret keys. A first entity creates public and private keys by generating a product n of two large, randomly chosen prime numbers, and then generating random matrices {A, C}, in the group GL(r,Zn) with a chosen matrix rank r such that AC is not equal to CA, and then generating a matrix B=CAC, and finding a matrix G that commutes with C. Matrices A, B, G and the integers n and r are then published as the public key and matrix C is then kept as the private key. A second entity then obtains the public key and calculates a secret matrix D that commutes with G, and further calculates the matrices K=DBD and E=DAD. The message to be sent is then encrypted using matrix K as the secret key and then sent to the first entity with matrix E. First entity then retrieves secret matrix K using K=CEC and then decrypts the received encrypted message using the retrieved secret matrix K.Type: ApplicationFiled: July 26, 2006Publication date: February 14, 2008Inventor: Keith R. Slavin
-
Publication number: 20080037775Abstract: The present invention provides a method, system, and device for producing cryptographic keys. More specifically, the cryptographic keys may be produced such that they have an effective key size and an apparent key size that differs from the effective key size. Generally, the effective key size is not restricted by export regulations and the apparent key size may be restricted by export regulations.Type: ApplicationFiled: March 31, 2006Publication date: February 14, 2008Applicant: Avaya Technology LLCInventor: Robert R. Gilman
-
Publication number: 20080037776Abstract: A digital signature generation apparatus includes memory to store finite field Fq and section D(ux(s, t), uy(s, t), s, t) as secret key, section being one of surfaces of three-dimensional manifold A(x, y, s, t) which is expressed by x-coordinate, y-coordinate, parameter s, and parameter t and is defined on finite field Fq, x-coordinate and y-coordinate of section being expressed by functions of parameter s and parameter t, calculates hash value of message m, generates hash value polynomial by embedding hash value in 1-variable polynomial h(t) defined on finite field Fq, and generates digital signature Ds(Ux(t), Uy(t), t) which is curve on section, the x-coordinate and y-coordinate of curve being expressed by functions of parameter t, by substituting hash value polynomial in parameter s of section.Type: ApplicationFiled: July 24, 2006Publication date: February 14, 2008Inventors: Koichiro Akiyama, Yasuhiro Goto
-
Publication number: 20080037777Abstract: In accordance with embodiments of the invention, a method is provided for performing a storage operation in a pipeline storage system in which one or more data streams containing data to be stored are written into data chunks. The method includes generating an encryption key associated with a first archive file to be stored when encryption is requested for the storage operation, encrypting the archive data from the data stream using the encryption key to create an encrypted data chunk when a data stream containing the archive file is processed in the pipeline storage system, storing the encrypted data chunk on a storage medium, and storing the encryption key in a manner accessible during a restore operation of the encrypted data chunk.Type: ApplicationFiled: August 22, 2007Publication date: February 14, 2008Inventors: Paul Ignatius, Anand Prahlad, Mahesh Tyagarajan, Manoj Retnamma, Arun Amarendran, Rajiv Kottomtharayil
-
Publication number: 20080037778Abstract: A set of users is divided into subsets, and a decipher key is generated for each subgroup by using different key generation polynomials. A session key, that is, a decipher key for ciphered data is distributed so as to be deciphered with the decipher key of each user. Decipher keys of an arbitrary number of users can be revoked. On confiscating a pirate deciphering unit, the black-box tracing is performed by assuming users subject to revocation to be suspects. The tracer assumes the suspects, and investigates the suspects n times (n being the total number of users), so that all pirates in a coalition can be identified.Type: ApplicationFiled: October 9, 2007Publication date: February 14, 2008Inventor: Tatsuyuki MATSUSHITA
-
Publication number: 20080037779Abstract: A method and system for authenticating a smart battery having a smart battery and an electronic device. Both the device and the smart battery generate encrypted random strings using key material based by A/D noise bits as a seed value. A pseudo random number is generated from the A/D noise that is transmitted to both the electronic device and the smart battery. The pseudo random number is used by both devices as a key index to select one of a plurality of keys stored in separate key libraries. The keys, or key material, is used to execute an encryption algorithm. The two encryption data streams are then compared to authenticate the smart battery.Type: ApplicationFiled: November 20, 2006Publication date: February 14, 2008Inventors: Andrew Seman, Daniele Brotto, Danh Trinh, Fugen Qin
-
Publication number: 20080037780Abstract: A content protection system including: a user interface for providing data modification parameters for protected and unprotected digital content, the protected digital content being encrypted; a software driver application for receiving the data modification parameters, processing the unprotected content in accordance with the modification parameters, and distributing the modification parameters to a protected content application; a protected content application having a protected data area wherein the protected data is decrypted into computer readable data, processed according to the data modification parameters, and re-encrypted for delivery to a rendering device; a rendering device including a rendering interface for decrypting the modified protected data, mixing it with the unprotected data to produce mixed data and outputting the mixed data.Type: ApplicationFiled: July 17, 2007Publication date: February 14, 2008Inventor: Leonard Layton
-
Publication number: 20080037781Abstract: In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player.Type: ApplicationFiled: October 15, 2007Publication date: February 14, 2008Applicant: Cryptography Research, Inc.Inventors: Paul Kocher, Joshua Jaffe, Benjamin Jun, Matthew Carter, Peter Pearson
-
Publication number: 20080037782Abstract: A method, apparatus, and system are directed towards reducing a channel change time contribution related to security for digital media devices by using key management and a virtual smart card. In one embodiment, Entitlement Control Messages (ECMs) used to provide access to content keys for decrypting of content are provided over the network to the digital media device at an increased frequency over traditional systems. In another embodiment, use of the virtual smart card is directed towards removing physical limitations that may arise due to the use of a physical smart card, separate secure microprocessor, or the like, and associated physical interface, thereby further reducing channel change times contributed to content protection components of the digital media device.Type: ApplicationFiled: July 19, 2007Publication date: February 14, 2008Applicant: Widevine Technologies, Inc.Inventor: Glenn A. Morten
-
Publication number: 20080037783Abstract: Provided are a device and method for providing a video stream, in which a hash value of a frame is included in the header of a video stream, and authentication information about the header is inserted into the video stream, thus ensuring integrity against the forgery of the video stream. The device includes a base frame encoding unit which encodes a base frame, an enhancement frame encoding unit which encodes an enhancement frame, a frame encryption unit which encrypts the encoded base frame and the encoded enhancement frame, a hash processing unit which calculates hash values for the encrypted base frame and the encrypted enhancement frame and hash values included in headers of previous and subsequent video streams, a header management unit which includes information about the encoded base frame and the encoded enhancement frame and the calculated hash values, in a header, and manages the header, and an authentication information creation unit which creates authentication information about the header.Type: ApplicationFiled: March 23, 2007Publication date: February 14, 2008Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Hyoung-shick Kim, Kyung-mo Park, Myung-soo Chang
-
Publication number: 20080037784Abstract: The repeater of the present invention communicates data signals over power lines. The repeater of one embodiment includes at least one modem that receives a data packet and attempts to decrypt the data packet with a first and/or second encryption key. If the packet is successfully decrypted using the first encryption key, the packet is encrypted using the second encryption and transmitted over the power line. If the packet is successfully decrypted using the second encryption key, the packet is encrypted using the first encryption and transmitted over the power line.Type: ApplicationFiled: October 16, 2007Publication date: February 14, 2008Inventors: Kevin Corcoran, James Mollenkopf
-
Publication number: 20080037785Abstract: A constrained proxy key is used to secure communications between two devices via an intermediary device. A first proxy key is generated at a host device (key generator device) based on a shared secret key, one or more constraints on the first proxy key, and a key derivation function. At least the shared secret key and key derivation function are known to the host device an a client device (authentication device). The first proxy key is sent to a proxy device to use in authenticating communications with the client device. An authenticated message is generated by the proxy device using the first proxy key and sent to the client device. The client device locally generates a second proxy key using the key derivation function, one or more constraints, and the shared secret key for authenticating the proxy device. The proxy device is authenticated if the client device successfully accesses the authenticated message from the proxy device using the second proxy key.Type: ApplicationFiled: September 27, 2006Publication date: February 14, 2008Inventors: Alexander Gantman, Tolga Yalcinkaya, Gregory Gordon Rose, Lu Xiao
-
Publication number: 20080037786Abstract: A station and a method of collecting information corresponding to security. A wireless communicator transmits a request packet to search a wireless network to at least one external device and receives a response packet to the request packet. An authentication method determiner analyzes the response packet to search for at least one wireless network and determines an authentication method supported by each of the searched wireless networks. A storage unit stores the determined authentication method of each of the searched wireless networks. Thus, necessary information corresponding to security during a connection to a wireless network can be searched in advance and provided to a user.Type: ApplicationFiled: February 8, 2007Publication date: February 14, 2008Applicant: Samsung Electronics Co., LtdInventor: Sung-joon Park
-
Publication number: 20080037787Abstract: A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.Type: ApplicationFiled: October 19, 2007Publication date: February 14, 2008Applicant: Seven Networks, Inc.Inventors: Lee Boynton, Trevor Fiatal, Scott Burke, Mark Sikes
-
Publication number: 20080037788Abstract: A data decryption apparatus that decrypts encrypted data, includes a first data-receiving unit that receives a first data set, in which information on an encryption specification is embedded, through a first communication path; a time-information obtaining unit that obtains time information on a reception of the first data set by the first data receiving unit; a time-information storage unit that stores the time information with the information on the encryption specification associated therewith; a second data-receiving unit that receives a second data set through a second communication path, the second data set being encrypted based on the encryption-specification and appended by time information on performing data encryption; and an encryption-specification selecting unit that selects an encryption specification for use in decryption of the second data set based on the time information stored in the time-information storage unit and the time information appended to the second data set.Type: ApplicationFiled: July 23, 2007Publication date: February 14, 2008Applicant: FUJITSU LIMITEDInventors: Taro Togawa, Kaori Endo, Takeshi Otani, Masakiyo Tanaka, Yasuji Ota
-
Publication number: 20080037789Abstract: Document management that offers improved ease-of-use is realized. A document storage unit 240 stores a document file to be encrypted. A document display unit 210 displays the contents of the document file on a screen. An encryption region specifying unit 214 allows a document editor to input data that specifies the region of the encryption target data in the document file displayed on the screen. A public key storage unit 242 stores public key data that corresponds to private key data held by document checkers. A checker level setting unit 216 allows the document editor to input data that specifies the access level for the encryption target data. A key search unit 232 detects the public key data that corresponds to the private key data of the document checker thus specified. An encryption processing unit 234 encrypts the encryption target data according to the public key encryption method using the public key data thus detected.Type: ApplicationFiled: June 21, 2005Publication date: February 14, 2008Applicant: JUSTSYSTEMS CORPORATIONInventor: Daisuke Motohashi
-
Publication number: 20080037790Abstract: Systems and methods for exchanging and processing encoded quantum signals in quantum key distribution (QKD) systems in real time. A stream of quantum signals is sent from Alice to Bob. Alice only encodes sets or “frames” of the streamed quantum signals based on receiving a “ready” message from Bob. This allows for Bob to finish processing the previous frame of data by allowing different bit buffers to fill and then be used for data processing. This approach results in gaps in between frames wherein quantum signals in the stream are sent unencoded and ignored by Bob. However, those quantum signals that are encoded for the given frame are efficiently processed, which on the whole is better than missing encoded quantum signals because Bob is not ready to receive and process them.Type: ApplicationFiled: August 14, 2006Publication date: February 14, 2008Inventors: Audrius Berzanskis, Brandon Kwok, Harry Vig, Jonathan Young
-
Publication number: 20080037791Abstract: Disclosed is a method and apparatus for evaluating actions performed on a client device. For each of the performed actions, a current key is generated from a previous key and an associated action attestation value is generated from the previous key and information about each action (stored in a log file). The previous key is then deleted. A final attestation value is also generated using a publicly non-invertible function and is based at least on the current key. The client device transmits information about the performed actions (stored in a log file), the plurality of action attestation values, and the final attestation value to the server so that the server can authenticate the action attestation values and the final attestation value. If the server cannot authenticate these attestation values, then the server can determine that the log file has been tampered with.Type: ApplicationFiled: August 6, 2007Publication date: February 14, 2008Inventor: Bjorn Jakobsson
-
Publication number: 20080037792Abstract: A method and system for key management and distribution are disclosed. A network can comprise plurality of stations, each station is dedicated to a network device and is configured to plug into an electrical receptacle so as to facilitate network communications via home electrical wiring for the network device. A hardware key is used to distribute keys among stations so as to enable access to the network for the dedicated network device. Each hardware key comprises a solid state memory. A key is stored in the solid state memory. The solid state memory is configured such that the key is not user modifiable. Thus, users cannot inadvertently delete or change the key.Type: ApplicationFiled: November 14, 2006Publication date: February 14, 2008Inventors: David Becker, Chia Lun Chung
-
Publication number: 20080037793Abstract: A security architecture in which a security module is integrated in a client machine, wherein the client machine includes a local host that is untrusted. The security module performs encryption and decryption algorithms, authentication, and public key processing. The security module also includes separate key caches for key encryption keys and application keys. A security module can also interface a cryptographic accelerator through an application key cache. The security module can authorize a public key and an associated key server. That public key can subsequently be used to authorize additional key servers. Any of the authorized key servers can use their public keys to authorize the public keys of additional key servers. Secure authenticated communications can then transpire between the client and any of these key servers. Such a connection is created by a secure handshake process that takes place between the client and the key server.Type: ApplicationFiled: October 16, 2007Publication date: February 14, 2008Applicant: BROADCOM CORPORATIONInventor: Mark Buer
-
Publication number: 20080037794Abstract: It is an object of the present invention to provide an acoustic system which, when producing a sound from pillow speakers, can provide a natural feeling, without bringing about any incongruity to a listener. The acoustic system is provided with a low pass filter for extracting a low frequency component of a reproduction signal outputted from a signal source and supplying the extracted signal to pillow speakers, and a high pass filter for extracting a high frequency component of the reproduction signal and supplying the extracted signal to a normal position speaker, thereby fixing a sound emitted from the pillow speakers and a sound emitted from the normal position speaker on the normal position speaker side.Type: ApplicationFiled: April 27, 2005Publication date: February 14, 2008Applicant: PIONEER CORPORATIONInventors: Keitaro Sugawara, Hideyuki Yusa, Atsushi Makino, Shinichi Sato, Kensaku Yoshida
-
Method, medium, and system decoding compressed multi-channel signals into 2-channel binaural signals
Publication number: 20080037795Abstract: A decoding method, medium, and system decoding an input compressed multi-channel signal, as a mono or stereo signal, into 2-channel binaural signals. Channel signals making up the multi-channel signals may be reconstructed from the input compressed signal in the quadrature mirror filter (QMF) domain, and head related transfer functions (HRTFs) for localizing channel signals in the frequency domain, represented as values in the time domain, may be transformed into spatial parameters in the QMF domain. Accordingly, channel signals may be localized in the QMF domain in directions corresponding to the channels, thereby decoding the input compressed signal as 2-channel binaural signals.Type: ApplicationFiled: January 12, 2007Publication date: February 14, 2008Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Sangchul Ko, Junghoe Kim -
Publication number: 20080037796Abstract: A method for simulating spatially extended sound sources comprising: panning a first input signal over a plurality of output channels to generate a first multi-channel directionally encoded signal; panning a second input signal over the plurality of output channels to generate a second multi-channel directionally encoded signal; combining the first and second multi-channel directionally encoded signals to generate a plurality of loudspeaker output channels; and applying a bank of decorrelation filters on the loudspeaker output channels.Type: ApplicationFiled: August 8, 2007Publication date: February 14, 2008Applicant: CREATIVE TECHNOLOGY LTDInventors: Jean-Marc JOT, Martin WALSH, Adam PHILP
-
Publication number: 20080037797Abstract: At least one exemplary embodiment is directed to a system for monitoring a sound pressure level dose at an ear which includes an audio transducer adapted to be placed within an ear to receive sound at the ear. The audio transducer outputs a sound signal. A sound level threshold detector receives the sound signal and determines whether a sound pressure level of the sound signal is at a minimum level and outputs a sound pressure level signal corresponding to a sound pressure level of the sound pressure level when the sound pressure level is not at the minimum level. A clock calculates a time period during which the sound pressure level is not at the minimum threshold level. A listening fatigue calculator receives the sound signal and the time period and determines whether a cumulative effect of exposure to the sound at the ear over a monitored time period will cause harm to the ear. At least a portion of the system is disposed in situ at the ear.Type: ApplicationFiled: June 1, 2007Publication date: February 14, 2008Applicant: Personics Holdings Inc.Inventors: Steven Goldstein, John Usher, Brian Fligor
-
Publication number: 20080037798Abstract: The method comprises the steps of automatically monitoring and detecting indications indicative of a forthcoming event concerning hearing systems; if such an indication is detected, retrieving identification data identifying at least one device of the hearing system concerned, referred to as specific device, or a user of said hearing system concerned, referred to as specific user; ans using said identification data for retrieving further data related to said specific device as device data or related to said specific user as user data. The method and the corresponding system can be used for adjusting said specific hearing system or other support actions, like dispensing consumables for said specific hearing system, or preparatory actions, like launching a suitable fitting program or loading audiological data related to the user.Type: ApplicationFiled: August 21, 2006Publication date: February 14, 2008Applicant: PHONAK AGInventors: Herbert Baechler, Stefan Launer, Bernd Waldmann
-
Publication number: 20080037799Abstract: An apparatus and method of enabling equalization of a room parameter with a simple structure and low cost in an audio system using an acoustic transducer array. The apparatus to equalize a room parameter includes an audio signal generation unit to generate two identical audio signals, an audio signal modification unit to modify the audio signals, a sound beam generation unit to transform each of the two modified signals into a sound, to directly transmit one sound to the position of a listener, and to transmit the other sound to the position of the listener such that the other sound is reflected from a reflecting object and transmitted to the position of the listener, a sound magnitude determination unit to collect a sound generated through synthesis of the two sounds at the position of the listener, and a control unit to obtain a delay constant and a filter coefficient.Type: ApplicationFiled: January 29, 2007Publication date: February 14, 2008Applicant: Samsung Electronics Co., Ltd.Inventors: Sergey Yarygin, Vladislav Shimanskiy
-
Publication number: 20080037800Abstract: An electronic stethoscope having several modes of operation to process acoustic signals to provide filtered signals useful for diagnosis. In one mode of operation the stethoscope substantially provides only acoustic signals generated by biological activity of the heart. In another mode of operation, the acoustic stethoscope substantially provides only acoustic signals generated by biological activity of the lungs. In another mode of operation, the electronic stethoscope disproportionately amplifies abnormal heart sounds and normal heart sounds to enhance diagnosis of heart abnormalities. The electronic stethoscope is operated in a manner similar to a conventional acoustic stethoscope and has similar spectral characteristics, thus allowing a user with acoustic stethoscope experience to easily use the electronic stethoscope.Type: ApplicationFiled: March 2, 2007Publication date: February 14, 2008Inventors: James Grasfield, David Winston, John Purbrick, Peter Stark, Daniela Steinhubel
-
Publication number: 20080037801Abstract: Improved vocal signals are obtained in headsets and similar devices by including a microphone inside a chamber formed at least in part by the wearer's ear. This second microphone provides a reduced noise input signal. The reduced noise signal is corrected by input from another microphone, located outside the chamber. This correction can include echo cancellation, spectral shaping, frequency extension, and the like.Type: ApplicationFiled: August 10, 2006Publication date: February 14, 2008Applicant: Cambridge Silicon Radio, Ltd.Inventors: Rogerio G. Alves, Kuan-Chieh Yen
-
Publication number: 20080037802Abstract: Electronic teleconferencing configurations use one or more remote microphones for added functionality. A base unit includes an interface to a telecommunications network and at least one remote microphone in wireless communication with the base unit, enabling a carrier of the microphone to speak to a listener through the base unit over the telecommunications network. The base unit may form part of a telephone, and would preferably further include a docking station to receive the remote microphone along with electrical contacts causing the telephone to enter into a speakerphone mode when the remote microphone is removed for use. A speaker may either be provided in the base unit, or may be disposed in the housing of the remote microphone, for example, in the form of a headset. With multiple wireless microphones audio processing circuitry may be added for level control or microphone/speaker discrimination.Type: ApplicationFiled: October 16, 2007Publication date: February 14, 2008Inventors: John Posa, Barry Schwab
-
Publication number: 20080037803Abstract: Vehicle including an arrangement for controlling audio reception by occupants of a passenger compartment includes a frame defining an interior, at least one seat in the interior defining a plurality of seating positions, and a sound generating system for generating different audio sounds for each seating position. The sound generating system utilizes hypersonic sound, and may be an entertainment system which delivers music or other audio content to the occupants. A monitoring system determines the presence and/or position of occupants in the seating positions relative to the sound generating system. The sound generating system for each seating position may then be automatically adjustable based on the determined presence and/or position of the occupant in the seating position such that different sounds are audible to each occupant.Type: ApplicationFiled: October 25, 2007Publication date: February 14, 2008Applicant: AUTOMOTIVE TECHNOLOGIES INTERNATIONAL, INC.Inventor: David Breed
-
Publication number: 20080037804Abstract: Neural networks provide efficient, robust and precise filtering techniques for compensating linear and non-linear distortion of an audio transducer such as a speaker, amplified broadcast antenna or perhaps a microphone. These techniques include both a method of characterizing the audio transducer to compute the inverse transfer functions and a method of implementing those inverse transfer functions for reproduction. The inverse transfer functions are preferably extracted using time domain calculations such as provided by linear and non-linear neural networks, which more accurately represent the properties of audio signals and the audio transducer than conventional frequency domain or modeling based approaches. Although the preferred approach is to compensate for both linear and non-linear distortion, the neural network filtering techniques may be applied independently.Type: ApplicationFiled: August 1, 2006Publication date: February 14, 2008Inventor: Dmitry V. Shmunk
-
Publication number: 20080037805Abstract: Disclosed herein is an audio output device including: an equalizer configured to execute frequency characteristic correction processing for an audio signal from an audio source; an output part configured to supply an audio signal processed by the equalizer to a speaker for audio output from the speaker; a signal analyzer configured to analyze a frequency characteristic of an input audio signal to thereby obtain a gain of each of sample points on a frequency axis; and an arithmetic unit configured to control parameters of the equalizer, the arithmetic unit extracting sample points having substantially equal intervals on a logarithmic-scale frequency axis from sample points of which gains have been obtained by the signal analyzer, the arithmetic unit calculating parameters of the equalizer by using differences between gains of the extracted sample points and gains at frequencies corresponding to the extracted sample points on a target frequency characteristic.Type: ApplicationFiled: April 9, 2007Publication date: February 14, 2008Applicant: SONY CORPORATIONInventors: Yasuyuki Kino, Tokihiko Sawashi
-
Publication number: 20080037806Abstract: The invention is directed at a preamplifier for a musical instrument comprising apparatus for receiving and processing a signal from a sound gathering device and for transmitting the processed signal to an external apparatus; an internal power source; a voltage receiving circuit, for receiving power from the external apparatus; and a voltage determining circuit, connected to the internal power source and the voltage receiving circuit, for determining whether the internal power source or the voltage receiving circuit should power the preamplifier by determining which is providing a higher voltage.Type: ApplicationFiled: August 13, 2007Publication date: February 14, 2008Inventor: Leslie M. Schatten
-
Publication number: 20080037807Abstract: A digital audio driver having a floating PWM input and for controlling a stage of high voltage, high speed high- and low-side MOSFETs series connected at a node. The driver includes a floating input interface circuit having a protection circuit to provide secure protection sequence against over-current conditions; and high and low side circuits for driving the high- and low-side MOSFETs, each high and low side circuit including a bi-directional current sensing circuit which requires no external shunt resistors that enables capture of over-current conditions at either positive or negative load current direction. The RDS(ON) of the high- and low-side MOSFETs is used as current sensing resistors, once the RDS(ON) exceeds a pre-determined threshold, an over current output signal is fed to the protection block to shutdown the MOSFET to protect the devices.Type: ApplicationFiled: July 25, 2007Publication date: February 14, 2008Inventor: Jun Honda
-
Publication number: 20080037808Abstract: An ultrasonic transducer in which lead wire connection is facilitated even when piezoelectric devices are divided in order to prevent lateral vibrations from affecting longitudinal vibrations is manufactured by a method comprising: a step in which first dicing grooves are formed on an acoustic matching layer and a piezoelectric device plate that are mounted together in order to form a plurality of piezoelectric devices; a step in which a board and the respective piezoelectric devices are connected together; a step in which surfaces in the vicinity of locations at which the board and the piezoelectric devices are connected together are coated with a conductive sheet; and a step in which the plurality of transducer elements are formed by forming second dicing grooves between the first dicing grooves formed on the piezoelectric devices and the board that is coated with the conductive sheet and on the acoustic matching layer.Type: ApplicationFiled: October 4, 2005Publication date: February 14, 2008Inventors: Yukihiko Sawada, Akiko Mizunuma, Katsuhiro Wakabayashi, Takuya Imahashi, Sunao Sato