Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
DYNAMIC AUDIO DATA TRANSFER MASKING
Document Type and Number:
WIPO Patent Application WO/2019/036092
Kind Code:
A1
Abstract:
Techniques herein provide computer-implemented methods to dynamically mask audio-based data transfer. A computing device encodes data to be transferred into an audio file that produces a sound unpleasant to the human ear. The computing device determines frequency points and amplitude for the encoded audio file, and creates a masking sound file based on the determined frequency points and amplitude. The masking sound file may comprise a masking sound that is pleasant to the human ear. The computing device plays the encoded audio file and the masking sound file. In an example, the computing device combines the encoded audio file and the masking sound file into a single sound file and plays single sound file. In another example, the computing device plays the encoded audio file and the masking sound file as two separate sound files simultaneously.

Inventors:
MADAN ARJITA (IN)
GUPTA AVIRAL (IN)
GWALANI SUMIT (IN)
AHLAWAT MRINAL (IN)
KHANNA HEMAN (IN)
LAISHRAM ROHAN (IN)
Application Number:
PCT/US2018/036783
Publication Date:
February 21, 2019
Filing Date:
June 08, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
GOOGLE LLC (US)
International Classes:
G10L21/0208; G10K11/175
Domestic Patent References:
WO2014191798A12014-12-04
Foreign References:
US20140006017A12014-01-02
US20070083361A12007-04-12
US20100104112A12010-04-29
Other References:
None
Attorney, Agent or Firm:
ENGLE, Nichole Weber (US)
Download PDF:
Claims:
CLAIMS

What is claimed is:

1. A computer-implemented method to dynamically mask audio-based data transfer, comprising:

encoding, by a computing device, data to be transferred into an audio file for an audio-based transmission, wherein the encoded audio file produces a sound audible to a human ear;

determining, by the computing device, frequency points for the encoded audio file; determining, by the computing device, amplitude for the encoded audio file;

creating, by the computing device, a masking sound file based on the determined frequency points and amplitude for the encoded audio file, the masking sound file producing a masking sound; and

playing, by the computing device, the encoded audio file and the masking sound file, wherein the masking sound masks the sound produced by the encoded audio file.

2. The computer-implemented method of claim 1, wherein creating the masking sound file comprises applying a function using the determined frequency points and amplitude for the encoded audio file.

3. The computer-implemented method of claim 1 or 2, wherein creating the masking sound file comprises encoding a separate audio file.

4. The computer-implemented method of any one of claims 1 to 3, wherein the masking sound comprises lower frequency points than the encoded audio file.

5. The computer-implemented method of any one of the preceding claims, wherein the masking sound frequency points and the frequency points of the encoded audio file comprise harmonic frequencies.

6. The computer-implemented method of claim 5, wherein multiples of the same fundamental frequency are used to produce the masking sound frequency.

7. The computer-implemented method of claim 6, wherein multiples of 100 hertz are used to produce the masking sound frequency.

8. The computer-implemented method of any one of the preceding claims, wherein the masking sound comprises a masking sound amplitude that is lower than a threshold amplitude so as not to interfere with data transfer of the encoded audio file.

9. The computer-implemented method of any one of the preceding claims, wherein properties of the masking sound are dependent upon the data to be transferred.

10. The computer-implemented method of any one of the preceding claims, further comprising combining, by the computing device, the encoded audio file and the masking sound file into a single sound file, wherein playing the encoded audio file and the masking sound file comprises playing the single sound file.

11. The computer-implemented method of any one of claims 1 to 7, wherein playing the encoded audio file and the masking sound file comprises playing two separate sound files simultaneously.

12. The computer-implemented method of any one of the preceding claims, wherein the encoded audio file produces an unpleasant sound audible to a human ear.

13. The computer-implemented method of any one of the preceding claims, wherein the masking sound comprises a pleasant sound audible to a human ear.

14. The computer-implemented method of any one of the preceding claims, further comprising determining, by the computing device, that the encoded audio file produces an unpleasant sound audible to a human ear.

15. The computer-implemented method of claim 14, wherein determining that the encoded audio file produces an unpleasant sound audible to a human ear comprises determining that at least one of a sound frequency, a sound amplitude and sound volume are outside a pre-defined range for the sound frequency, sound amplitude or sound volume.

16. The computer-implemented method of any one of the preceding claims, further comprising determining, by the computing device, that the masking sound comprises a pleasant sound audible to a human ear.

17. The computer-implemented method of claim 16, wherein determining that the masking sound comprises a pleasant sound audible to a human ear comprises determining that at least one of a sound frequency, a sound amplitude and sound volume are within a predefined range for the sound frequency, sound amplitude or sound volume.

18. The computer-implemented method of any one of the preceding claims, wherein the data to be transferred is encoded in sound waves via modulation by varying one or more properties of a carrier sound wave.

19. A system to dynamically mask audio-based data transfer, comprising:

a storage device; and

a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to:

encode data to be transferred into an audio file for an audio-based transmission, wherein the encoded audio file produces a sound audible to a human ear;

determine frequency points for the encoded audio file;

determine amplitude for the encoded audio file;

create a masking sound file based on the determined frequency points and amplitude for the encoded audio file, the masking sound file producing a masking sound; and play the encoded audio file and the masking sound file, wherein the masking sound masks the sound produced by the encoded audio file.

20. The system of claim 19, wherein the masking sound comprises lower frequency points than the encoded audio file masking sound, and wherein the masking sound frequency points and the frequency points of the encoded audio file comprise harmonic frequencies.

21. The system of claim 19 or 20, wherein the masking sound comprises a masking sound amplitude that is lower than a threshold amplitude so as not to interfere with data transfer of the encoded audio file.

22. The system of any one of claims 19 to 21, where the processor is further configured to execute application code instructions stored in the storage device to cause the system to combine the encoded audio file and the masking sound file into a single sound file, wherein playing the encoded audio file and the masking sound file comprises playing the single sound file.

23. A computer program product, comprising:

a non-transitory computer-readable storage device having computer-executable program instructions embodied therein that when executed by a computer cause the computer to dynamically mask audio-based data transfer, the computer-readable program instructions comprising:

computer-readable program instructions to determine frequency points for the encoded audio file;

computer-readable program instructions to determine amplitude for the encoded audio file;

computer-readable program instructions to create a masking sound file based on the determined frequency points and amplitude for the encoded audio file, the masking sound file producing a masking sound; and

computer-readable program instructions to play the encoded audio file and the masking sound file, wherein the masking sound masks the sound produced by the encoded audio file.

24. The computer program product of claim 23, wherein the masking sound comprises lower frequency points than the encoded audio file masking sound, and wherein the masking sound frequency points and the frequency points of the encoded audio file comprise harmonic frequencies.

25. The computer program product of claim 23 or 24, where the processor is further configured to execute application code instructions stored in the storage device to cause the system to combine the encoded audio file and the masking sound file into a single sound file, wherein playing the encoded audio file and the masking sound file comprises playing the single sound file.

26. The computer program product of claim 23 or 24, further comprising computer-readable program instructions to combine the encoded audio file and the masking sound file into a single sound file, wherein playing the encoded audio file and the masking sound file comprises playing the single sound file.

Description:
DYNAMIC AUDIO DATA TRANSFER MASKING

CROSS-REFERENCE TO RELATED APPLICATION

[0001] This patent application claims priority to U.S. Patent Application No. 62/546, 133, filed August 16, 2017, and entitled "Dynamic Audio Data Transfer Masking." The entire contents of the above-identified application are hereby fully incorporated herein by reference.

TECHNICAL FIELD

[0002] The technology disclosed herein relates to dynamic creation of optimum audio output to mask audio-based data during transfer.

BACKGROUND

[0003] Mobile computing devices commonly exchange data via the Internet. In cases where an Internet connection is unavailable or undesirable, data can be transferred using peer-to-peer connectivity, such as Bluetooth or near field communications. However, these peer-to-peer connectivity solutions require specific hardware and APIs to function. Accordingly, there is a need to enable and use features and hardware commonly found on mobile computing devices to exchange data.

[0004] Each phone or mobile communication device has, by definition, a microphone and a speaker. By utilizing the microphone of one mobile communication device and the speaker of another mobile communication device, data can be transmitted over the sound waves. When the audio vibrates it vibrates with many frequencies, and each frequency produces a sound wave. High frequencies of audio result in less environmental noise. As a result, high frequencies of audio are ideal for the transfer of data. However, when data is transmitted over the high frequency sound waves it produces an unpleasant sound.

[0005] A sound can be played to mask the unpleasant sound produced by the transmission of data. However, as different data is encoded for an audio transmission, the resulting frequency and amplitude of the encoded audio fluctuates from one transmission to another.

SUMMARY

[0006] Techniques herein provide computer-implemented methods to dynamically mask audio-based data transfer. In an example, a computing device encodes data to be transferred into an audio file for an audio-based transmission, wherein the encoded audio file produces a sound audible to a human ear (which may be or may be not unpleasant to a human ear). The computing device determines frequency points for the encoded audio file and amplitude for the encoded audio file, and creates a masking sound file based on the determined frequency points and amplitude for the encoded audio file. The computing device plays the encoded audio file and the masking sound file. In an example, the computing device combines the encoded audio file and the masking sound file into a single sound file and plays single sound file. In another example, the computing device plays the encoded audio file and the masking sound file as two separate sound files simultaneously.

[0007] An ideal masking sound that may effectively mask an unpleasant sound produced by a data transfer can depend on the particular frequency and amplitude of the encoded audio. Accordingly, a masking sound may be dynamically produced that changes depending upon the data that is encoded for transfer.

[0008] The masking sound file may, for example, comprises a masking sound that is pleasant to the human ear. The masking sound could thus mask un unpleasant sound produced by the encoded audio file.

[0009] In certain other example aspects described herein, systems and computer program products for dynamic audio-based data transfer masking are provided.

[0010] These and other aspects, objects, features, and advantages of the examples will become apparent to those having ordinary skill in the art upon consideration of the following detailed description of illustrated examples.

BRIEF DESCRIPTION OF THE DRAWINGS

[0011] Figure 1 is a block diagram depicting a system for dynamic audio-based data transfer masking, in accordance with certain examples.

[0012] Figure 2 is a block flow diagram depicting a method for dynamic audio-based data transfer masking, in accordance with certain examples.

[0013] Figure 3 is a block flow diagram depicting a method for creating a masking sound, in accordance with certain examples.

[0014] Figure 4 is a block diagram depicting a computing machine and module, in accordance with certain examples. DETAILED DESCRIPTION OF THE EXAMPLES

Overview

[0015] The examples described herein provide computer-implemented techniques for dynamic audio-based data transfer masking. By using and relying on the methods and systems described herein, the broadcasting computing device and the account management computing system provide the capability to transmit data via audio communication channels in a manner that is more pleasant to the human ear. As such, the systems and methods described herein enables transmitting data via audio communication channels by broadcasting computing devices wherein a second sound is produced to mask the unpleasant nature of the transmitted data.

[0016] In an example, an account management computing system produces a set of rules that can be applied by a broadcasting computing device to create an ideal masking sound. In an example, the set of rules comprises a function or algorithm that, when applied to known data points from an encoded sound, produces an ideal masking sound. In this example, the masking sound is dynamically produced for each encoded audio transmission. In an example, the account management computing system transmits the rules for creating the masking sound to the broadcasting computing device. In another example, the account management computing system pushes the rules as an application update.

[0017] In an example, the broadcasting computing device encodes data for audio- based data transfer. In an example, the data is encoded in sound waves via modulation by varying one or more properties of the carrier sound wave (for example, amplitude, frequency, and/or phase). For example, the encoded audio has known frequencies. In this example, the known frequencies comprise a pitch or note higher than a threshold pitch or note, which results in an unpleasant sound.

[0018] Once the data for the audio-based data transfer is encoded, the broadcasting computing device creates a masking sound. In an example, the broadcasting computing device retrieves the rules for creating the masking sound and applies the rules to the known frequency points and amplitude of the encoded audio. In this example, the ideal masking sound plays at the right frequencies points and right amplitude to mask the unpleasant sound of the encoded audio. Based on the specific frequency points and the amplitude of the encoded audio, the broadcasting computing device will create a masking sound that will play at the ideal frequency points and amplitude. In an example, the rules for creating the masking sound comprise a function where the frequency points and amplitude of the encoded audio are entered as input and the masking sound is produced as an output. In an example, the broadcasting computing device encodes the outputted masking sound as a sound file.

[0019] An example broadcasting computing device is capable of playing two separate sounds as separate files simultaneously on separate streams. In this example, the broadcasting computing device plays the encoded audio file and the encoded masking sound file simultaneously. In an example, the broadcasting computing device plays the encoded audio file and the encoded masking sound file simultaneously through an audio component. In this example, the masking sound blocks the unpleasant sound of the encoded audio, resulting in a sound that is more pleasant to the human ear.

[0020] In another example, the broadcast computing device is not capable of playing two separate sounds as separate files simultaneously on separate streams. In this example, the broadcasting computing device combines the encoded audio file and the encoded masking sound file to create a single sound file. The broadcasting computing device then plays the single sound file. In an example, the broadcasting computing device plays the single sound file through an audio component. In this example, the masking sound blocks the unpleasant sound of the encoded audio, resulting in a sound that is more pleasant to the human ear.

[0021] By using and relying on the methods and systems described herein, the broadcasting computing device and the account management computing system enable a user to transmit relevant information directly from a broadcasting computing device without having to listen to the unpleasant nature of the sound produced by the encoded data. The masking sound is dynamically produced as a result of the audio encoded for the transmission of the data. Because the masking sound is dynamically produced, the methods and systems described herein reduce inputs required by users with respect to broadcasting computing devices to transmit information.

[0022] As such, the systems and methods described herein may be employed to preemptively find the best masking sound without requiring a user to physically manipulate the audio configurations. The system communicates the rules for creating the masking sound with an account management computing system that can push the rules to all like computing devices, saving time and resources. The automatic and dynamic nature of the system operates during the transmission of audio-based data. Thus, the system occurs in the background of the transmission at a rapid pace that is quicker than can be achieved by a human performing a like action.

[0023] A dynamic rules scheme can be shared among all different computing devices that supports audio-based data transfer. This dynamic rules scheme is beneficial, for example, when a new computing device is utilized for audio-based data transfer. In this example, when a new computing device model is launched in the market, lab testing can be used to derive the optimum rules and share it across computing devices of the same model.

[0024] In another example, this dynamic rules scheme is beneficial for example, when there is a shift in the intended audio-based data transfer scheme. For example changing the frequency bands at which all computing devices must send/receive. In this example, the determined configuration can be communicated to all computing devices. Such changes can be timed so that all computing devices move to the new rules scheme at a predefined time. In another example, the determined rules are communicated to groups of devices, which behave similarly (for example, those that are the same model or related models from the same manufacturer). In this example, the determined rules from a single computing device can trigger audio rule changes in a large number of devices, which belong to the same group.

[0025] Various examples will be explained in more detail in the following description, read in conjunction with the figures illustrating the program flow.

[0026] Turning now to the drawings, in which like numerals indicate like (but not necessarily identical) elements throughout the figures, examples are described in detail.

Example System Architecture

[0027] Figure 1 is a block diagram depicting a system for dynamic audio-based data transfer masking, in accordance with certain examples. As depicted in Figure 1, the example operating environment 100 comprises computing systems 110, 120, and 130 that are configured to communicate with one another via one or more networks 140 via network computing devices. In another example, two or more of these computing systems (including systems 110, 120, and 130) are integrated into the same system. In some examples, a user associated with a computing device must install an application and/or make a feature selection to obtain the benefits of the techniques described herein.

[0028] Each network 140 comprises a wired or wireless telecommunication mechanism by which network computing systems (including systems 110, 120, and 130) can communicate and exchange data. For example, each network 140 can be implemented as, or may be a part of, a storage area network (SAN), personal area network (PAN), a metropolitan area network (MAN), a local area network (LAN), a wide area network (WAN), a wireless local area network (WLAN), a virtual private network (VPN), an intranet, an Internet, a mobile telephone network, a card network, Bluetooth, Bluetooth Low Energy (BLE), near field communication network (NFC), any form of standardized radio frequency, infrared, sound (for example, audible sounds, melodies, and ultrasound), other short range communication channel, or any combination thereof, or any other appropriate architecture or system that facilitates the communication of signals, data, and/or messages (generally referred to as data). Throughout this specification, it should be understood that the terms "data" and "information" are used interchangeably herein to refer to text, images, audio, video, or any other form of information that can exist in a computer-based environment.

[0029] In an example, each network computing system (including systems 110, 120, and 130) comprises a computing device having a communication module capable of transmitting and receiving data over the network 140. For example, each network computing system (including systems 110, 120, and 130) may comprise a server, personal computer, mobile device (for example, notebook computer, tablet computer, netbook computer, personal digital assistant (PDA), video game device, GPS locator device, cellular telephone, Smartphone, or other mobile device), a television with one or more processors embedded therein and/or coupled thereto, or other appropriate technology that comprises or is coupled to a web browser or other application for communicating via the network 140. In the example depicted in Figure 1, the network computing systems (including systems 110, 120, and 130) are operated by users and an account management computing system operator, respectively.

[0030] An example broadcasting computing device 110 comprises a user interface

111, an application 113, an audio component 117, and a data storage unit 119. In an example, the broadcasting computing device 110 may be a personal computer, mobile device (for example, notebook, computer, tablet computer, netbook computer, personal digital assistant (PDA), video game device, GPS locator device, cellular telephone, Smartphone or other mobile device), television, wearable computing devices (for example, watches, rings, or glasses), or other appropriate technology that comprises or is coupled to a web server (or other suitable application for interacting with web page files) or that comprises or is coupled to an application 113.

[0031] The user can use the broadcasting computing device 110 to broadcast audio- based data via the audio component 117 using the user interface 111 and the application 113. For example, the user interface 111 comprises a touch screen, a voice-based interface, or any other interface that allows the user to provide input and receive output from the application 113. In an example, the user interacts with the application 113 via the user interface 111 to select or instruct the broadcasting computing device 110 to broadcast audio-based data via the audio component 117. [0032] The application 113 is a program, function, routine, applet or similar entity that exists on and performs its operations on the broadcasting computing device 110. For example, the application 113 may be one or more of an audio application, a data application, an account management computing system 130 application, an Internet browser, a user interface 111 application, or other suitable application operating on the broadcasting computing device 110. In some examples, the user must install an application 113 and/or make a feature selection on the broadcasting computing device 110 to obtain the benefits of the techniques described herein.

[0033] In an example, the data storage unit 119 and application 113 may be implemented in a secure element or other secure memory (not shown) on the broadcasting computing device 110. In another example, the data storage unit 119 may be a separate memory unit resident on the broadcasting computing device 110. An example data storage unit 119 enables storage of rules for creating an optimum masking sound. In an example, the data storage unit 119 can comprise a local or remote data storage structure accessible to the broadcasting computing device 110 suitable for storing information. In an example, the data storage unit 119 stores encrypted information, such as HTML5 local storage.

[0034] In an example, the audio component 117 comprises a speaker device or other device capable of producing a sound output. An example sound output comprises an ultrasound output. In an example, the audio component 117 communicates with the application 113 to receive an instruction to broadcast a sound output. In an example, the audio component 117 is a component of the broadcasting computing device 110. In another example, the audio component 117 is communicatively coupled to the broadcasting computing device 110.

[0035] An example broadcasting computing device 110 communicates with a receiving computing device 120 via an audio communication channel. An example communication via the audio communication channel comprises the transmission of audio- based data. In an example, the data is transferred from the broadcasting computing device 110 to the receiving computing device 120 over sound waves.

[0036] An example receiving computing device 120 comprises a user interface 121, an application 123, a microphone component 125, and a data storage unit 129. In an example, the receiving computing device 120 may be a personal computer, mobile device (for example, notebook, computer, tablet computer, netbook computer, personal digital assistant (PDA), video game device, GPS locator device, cellular telephone, Smartphone or other mobile device), television, wearable computing devices (for example, watches, rings, or glasses), or other appropriate technology that comprises or is coupled to a web server (or other suitable application for interacting with web page files) or that comprises or is coupled to an application 123.

[0037] The user can use the receiving computing device 120 to receive audio-based data via the microphone component 125 using the user interface 121 and the application 123. For example, the user interface 121 comprises a touch screen, a voice-based interface, or any other interface that allows the user to provide input and receive output from the application 123. In an example, the user interacts with the application 123 via the user interface 121 to receive, read, or interact with the audio-based data received via the microphone component 125.

[0038] The application 123 is a program, function, routine, applet or similar entity that exists on and performs its operations on the receiving computing device 120. For example, the application 123 can be one or more of an audio application, a data application, an account management computing system 130 application, an Internet browser, a user interface 121 application, or other suitable application operating on the receiving computing device 120. In some examples, the user must install an application 123 and/or make a feature selection on the receiving computing device 120 to obtain the benefits of the techniques described herein.

[0039] In an example, the data storage unit 129 and application 123 may be implemented in a secure element or other secure memory (not shown) on the receiving computing device 120. In another example, the data storage unit 129 may be a separate memory unit resident on the receiving computing device 120. In an example, the data storage unit 129 can comprise a local or remote data storage structure accessible to the receiving computing device 120 suitable for storing information. In an example, the data storage unit 129 stores encrypted information, such as HTML5 local storage.

[0040] In an example, the microphone component 125 comprises a microphone device that is capable of receiving sound inputs from an environment of the receiving computing device 120. In an example, the microphone component 125 communicates with the application 123 to receive an instruction to transition from a passive mode to an active mode and listen for sound inputs. In an example, the microphone component 125 receives sound inputs while in the active mode and transmits the received sound inputs to the application 123.

[0041] An example receiving computing device 120 and broadcasting computing device 110 communicate with the account management computing system 130. An example account management computing system 130 comprises an account management component 131, an audio configuration component 133, and a data storage unit 137.

[0042] In an example, the receiving computing device 120 and broadcasting computing device 110 register with or are otherwise associated with the account management computing system 130. In this example, the account management computing system 130 is capable of identifying the receiving computing device 120 and broadcasting computing device 110 and transmitting hardware configurations, instructions, updates, or other forms of data transmission to each computing device 110 and 120. In another example, the account management computing system 130 is capable of identifying communications or transmissions received from the receiving computing device 120 and broadcasting computing device 110. In an example each device has a unique or otherwise identifiable code associated with it. In an example, each computing device (including 110 and 120) downloads or authorizes an application (including 113 and 123) associated with the account management computing system 130 onto the device to perform the techniques described herein. In an example, this information is maintained within the account management component 131.

[0043] In an example, the broadcasting computing device 110 comprises rules for creating an optimal masking sound. In an example, the account management computing device 130 communicates with the broadcasting computing device 110 to provide the rules for creating an optimal masking sound.

[0044] In an example, the audio configuration component 133 determines the rules for creating an optimum masking sound for multiple broadcasting computing devices (including 110). For example, the set of rules utilizes harmonic frequencies to produce the ideal masking sound. In this example, the rules utilize multiples of the same fundamental frequency to produce a more pleasant masking sound. For example, the masking sound and encoded audio play at frequencies that are multiples of a specific, predetermined frequency. In another example, the ideal masking sound comprises high enough amplitude to mask the encoded audio. However, the ideal masking sound also comprises low enough amplitude so it does not interfere with the data transfer. In an example, an unpleasant sound comprises a sound with one or more features or attributes that are outside of a predefined acceptable range.

[0045] The rules for creating optimum masking sounds are saved in the data storage unit 137. In an example, the data storage unit 137 can comprise any local or remote data storage structure accessible to the account management computing system 130 suitable for storing information. In an example, the data storage unit 137 stores encrypted information, such as HTML5 local storage.

[0046] In another example, the computing device (including 110 and 120) perform some or all of the functions of the account management computing system 130.

[0047] It will be appreciated that the network connections shown are example and other means of establishing a communications link between the computers and devices can be used. Additionally, those having ordinary skill in the art and having the benefit of the present disclosure will appreciate that the computing devices illustrated in Figure 1 can have any of several other suitable computer system configurations. For example a receiving computing device 120 or a broadcasting computing device 110 embodied as a mobile phone or handheld computer may not include all the components described above.

[0048] In examples, the network computing devices and any other computing machines associated with the technology presented herein may be any type of computing machine such as, but not limited to, those discussed in more detail with respect to Figure 4. Furthermore, any functions, applications, or components associated with any of these computing machines, such as those described herein or any others (for example, scripts, web content, software, firmware, hardware, or modules) associated with the technology presented herein may by any of the components discussed in more detail with respect to Figure 4. The computing machines discussed herein may communicate with one another, as well as with other computing machines or communication systems over one or more networks, such as network 140. The network 140 may comprise any type of data or communications network, including any of the network technology discussed with respect to Figure 4.

Example Process

[0049] The components of the example operating environment 100 are described hereinafter with reference to the example methods illustrated in Figures 2-3. The example methods of Figures 2-3 may also be performed with other systems and in other environments. The operations described with respect to any of the Figures 2-3 can be implemented as executable code stored on a computer or machine readable non-transitory tangible storage medium (e.g., floppy disk, hard disk, ROM, EEPROM, nonvolatile RAM, CD-ROM, etc.) that are completed based on execution of the code by a processor circuit implemented using one or more integrated circuits; the operations described herein also can be implemented as executable logic that is encoded in one or more non-transitory tangible media for execution (e.g., programmable logic arrays or devices, field programmable gate arrays, programmable array logic, application specific integrated circuits, etc. [0050] Figure 2 is a block flow diagram depicting a method for dynamic audio-based data transfer masking, in accordance with certain examples. The method 200 is described with reference to the components illustrated in Figure 1. In an example, transmission of data encoded into an audio file produces a sound unpleasant to the human ear. In this example, the broadcasting computing device 110 produces a second sound to mask the unpleasant nature of the data transmitted in the encoded audio file.

[0051] In block 210, the account management computing system 130 determines rules for creating a masking sound. In an example, the masking sound is the second sound played simultaneous with or combined with an encoded audio file to mask the unpleasant sound of the encoded audio file.

[0052] In an example, an account management computing system produces a set of rules that can be applied by a broadcasting computing device to create an ideal masking sound. In an example, the set of rules comprises a function or algorithm that, when applied to known data points from an encoded sound, produces an ideal masking sound. In this example, the masking sound is dynamically produced for each encoded audio transmission.

[0053] In an example, the ideal masking sound comprises a lower frequency than the encoded audio transmission. In this example, the encoded audio transmission plays at a higher, more unpleasant frequency. The ideal masking sound comprises a lower, more pleasant frequency. In another example, the set of rules utilizes harmonic frequencies to produce the ideal masking sound. In this example, the rules utilize multiples of the same fundamental frequency to produce a more pleasant masking sound. For example, the masking sound and encoded audio play at frequencies that are multiples of a specific, predetermined frequency, e.g., multiples of 100 (for example, 200 hertz, 300 hertz, and 400 hertz). In yet another example, the ideal masking sound comprises high enough amplitude to mask the encoded audio. However, the ideal masking sound also comprises low enough amplitude so it does not interfere with the data transfer. In an example, an unpleasant sound comprises a sound with one or more features or attributes that are outside of a predefined acceptable range. For example, the unpleasant sound's frequency, amplitude, volume, or other attribute, are outside of a pre-defined acceptable range for sound frequency, amplitude, volume, or other attribute. In another example, an unpleasant sound comprises a sound that is perceptible to the average human ear. In an example, a pleasant sound comprises a frequency, amplitude, volume, and/or other attribute that are within pre-define acceptable ranges. [0054] In an example, the account management computing system 130 creates a function that, when the known frequencies and amplitudes of encoded data are fed into, produces an ideal masking sound for the encoded data. In this example, the masking sound changes depending upon the data to be transmitted. This provides the masking sound with the maximum ability to mask the unpleasant sound produced by the encoded data.

[0055] In block 220, the account management computing system 130 transmits the rules for creating masking sounds to the broadcasting computing device 110. In an example, the rules are applicable for multiple different types of broadcasting computing devices 110. For example, the rules are transmitted to all broadcasting computing devices 110 that comprise the same make or model. In another example, the rules device-specific. In an example, the account management computing system 130 transmits the rules for creating the masking sounds to the broadcasting computing device 110 via the network 140.

[0056] In block 225, the broadcasting computing device 110 receives the rules for creating the masking sound. In an example, the account management computing system 130 pushes the rules to the broadcasting computing device 110 as an application 113 update.

[0057] In block 230, the broadcasting computing device 110 saves the rules for crating the masking sound. In an example, the rules are saved by the application 113 in the data storage unit 119.

[0058] In block 240, the broadcasting computing device 110 encodes data for audio- based data transfer. In an example, the application 113 on the broadcasting computing device 110 encodes the data for audio-based data transfer. In an example, the data is encoded in sound waves via modulation by varying one or more properties of the carrier sound wave. Example varied property of the carrier sound wave comprises amplitude, frequency, and/or phase.

[0059] In an example, the encoded audio has known frequencies. The known frequencies comprise a pitch or note higher than a threshold pitch or note, which results in an unpleasant sound. In another example, the encoded audio has known amplitudes. In an example, the audio component 117 of the broadcasting computing device 110 is capable of broadcasting (and the microphone component 125 of the receiving computing device 120 is capable of receiving) a limited spectrum of frequencies, which results in a restricted bandwidth.

[0060] In block 250, the broadcasting computing device 130 creates the masking sound. The method for creating a masking sound is described in more detail hereinafter with reference to the methods described in Figure 3. [0061] Characteristics of a sound comprise the pitch and loudness, both of which are determined by the frequency and amplitude of the sound wave. The pitch of the sound depends on the frequency of the wave. The higher the frequency of the sound wave, the higher the pitch. A higher pitch results in a higher perceived shrillness of the sound. The loudness of the sound depends on the amplitude of the vibration producing the sound. The higher the amplitude of the vibration, the louder the sound. A louder sound results in a higher perceived intensity of the sound.

[0062] In an example, the ideal masking sound plays at the right frequencies points and right amplitude to mask the unpleasant sound of the encoded audio. Based on the specific frequency points and the amplitude of the encoded audio, the broadcasting computing device 110 creates a masking sound plays at the ideal frequency points and amplitude.

[0063] Figure 3 is a block flow diagram depicting a method 250 for creating a masking sound, in accordance with certain examples, as referenced in block 250. The method 200 is described with reference to the components illustrated in Figure 1.

[0064] In block 310, the broadcasting computing device 110 retrieves the rules for creating the masking sound. In an example, the rules for creating the masking sound were determined by the account management computing system 130 in block 210 of Figure 2, and saved by the broadcasting computing device 110 in block 230 of Figure 2. In this example, the rules for creating the masking sound are retrieved by the application 113 from the data storage unit 119.

[0065] In block 320, the broadcasting computing device 110 determines the frequency points for the encoded audio. In an example, the audio-based data has known frequencies when encoded, and the broadcasting computing device 110 retrieves the known frequency points. In another example, the frequency points are measured or calculated.

[0066] In block 330, the broadcasting computing device 110 determines the amplitude of the encoded audio. In an example, the audio-based data has known amplitudes when encoded, and the broadcasting computing device 110 retrieves the known amplitudes. In another example, the amplitudes are measured or calculated.

[0067] In block 340, the broadcasting computing device 110 applies the rules for creating the masking sound to the determined frequency points and amplitude. In an example, the ideal masking sound plays at the right frequencies points and right amplitude to mask the unpleasant sound of the encoded audio. Based on the specific frequency points and the amplitude of the encoded audio, the broadcasting computing device 110 creates a masking sound that plays at the ideal frequency points and amplitude. In an example, the rules for creating the masking sound comprise a function where the frequency points and amplitude of the encoded audio are entered as input and the masking sound is produced as an output. In an example, the broadcasting computing device 110 encodes the outputted masking sound as a sound file. In an example,

[0068] The method 250 then proceeds to block 260 in Figure 2.

[0069] In block 260, the broadcasting computing device 110 determines whether it is capable of playing two separate sounds as separate files simultaneously on separate streams. In an example, the broadcasting computing device 110 comprises hardware that can play two sounds at the same time. For example, the audio component 117 can play two sounds at the same time.

[0070] If the broadcasting computing device 110 cannot play two separate sounds as separate files simultaneously on separate streams, the method 200 proceeds to block 270 in Figure 2. In block 270, the broadcasting computing device 110 combines the encoded audio file and the encoded masking sound file to create a single sound file. In an example the application 113 merges or combines the audio files to create a single sound file.

[0071] In block 275, the broadcasting computing device 110 plays the single sound file. In an example, the broadcasting computing device 110 plays the single sound file through the audio component 117. In this example, the masking sound blocks the unpleasant sound of the encoded audio, resulting in a sound that is more pleasant to the human ear.

[0072] Returning to block 260, if the broadcasting computing device 110 is capable of playing two separate sounds as separate files simultaneously on separate streams, the method 200 proceeds to block 280 in Figure 2. In block 280, the broadcasting computing device 110 plays the encoded audio file and the encoded masking sound file simultaneously. In an example, the broadcasting computing device 110 plays the encoded audio file and the encoded masking sound file simultaneously through the audio component 117. In this example, the masking sound blocks the unpleasant sound of the encoded audio, resulting in a sound that is more pleasant to the human ear.

[0073] In block 290, the receiving computing device 120 receives the encoded audio file. In an example, the receiving computing device 120 receives the encoded audio file via the microphone component 125. In an example, the application 123 of the receiving computing device 120 is capable of decoding the encoded audio file. Other Examples

[0074] Figure 4 depicts a computing machine 2000 and a module 2050 in accordance with certain examples. The computing machine 2000 may correspond to any of the various computers, servers, mobile devices, embedded systems, or computing systems presented herein. The module 2050 may comprise one or more hardware or software elements configured to facilitate the computing machine 2000 in performing the various methods and processing functions presented herein. The computing machine 2000 may include various internal or attached components such as a processor 2010, system bus 2020, system memory 2030, storage media 2040, input/output interface 2060, and a network interface 2070 for communicating with a network 2080.

[0075] The computing machine 2000 may be implemented as a conventional computer system, an embedded controller, a laptop, a server, a mobile device, a smartphone, a set-top box, a kiosk, a router or other network node, a vehicular information system, one more processors associated with a television, a customized machine, any other hardware platform, or any combination or multiplicity thereof. The computing machine 2000 may be a distributed system configured to function using multiple computing machines interconnected via a data network or bus system.

[0076] The processor 2010 may be configured to execute code or instructions to perform the operations and functionality described herein, manage request flow and address mappings, and to perform calculations and generate commands. The processor 2010 may be configured to monitor and control the operation of the components in the computing machine 2000. The processor 2010 may be a general purpose processor, a processor core, a multiprocessor, a reconfigurable processor, a microcontroller, a digital signal processor ("DSP"), an application specific integrated circuit ("ASIC"), a graphics processing unit ("GPU"), a field programmable gate array ("FPGA"), a programmable logic device ("PLD"), a controller, a state machine, gated logic, discrete hardware components, any other processing unit, or any combination or multiplicity thereof. The processor 2010 may be a single processing unit, multiple processing units, a single processing core, multiple processing cores, special purpose processing cores, co-processors, or any combination thereof. According to certain examples, the processor 2010 along with other components of the computing machine 2000 may be a virtualized computing machine executing within one or more other computing machines.

[0077] The system memory 2030 may include non-volatile memories such as readonly memory ("ROM"), programmable read-only memory ("PROM"), erasable programmable read-only memory ("EPROM"), flash memory, or any other device capable of storing program instructions or data with or without applied power. The system memory 2030 may also include volatile memories such as random access memory ("RAM"), static random access memory ("SRAM"), dynamic random access memory ("DRAM"), and synchronous dynamic random access memory ("SDRAM"). Other types of RAM also may be used to implement the system memory 2030. The system memory 2030 may be implemented using a single memory module or multiple memory modules. While the system memory 2030 is depicted as being part of the computing machine 2000, one skilled in the art will recognize that the system memory 2030 may be separate from the computing machine 2000 without departing from the scope of the subject technology. It should also be appreciated that the system memory 2030 may include, or operate in conjunction with, a nonvolatile storage device such as the storage media 2040.

[0078] The storage media 2040 may include a hard disk, a floppy disk, a compact disc read only memory ("CD-ROM"), a digital versatile disc ("DVD"), a Blu-ray disc, a magnetic tape, a flash memory, other non-volatile memory device, a solid state drive ("SSD"), any magnetic storage device, any optical storage device, any electrical storage device, any semiconductor storage device, any physical-based storage device, any other data storage device, or any combination or multiplicity thereof. The storage media 2040 may store one or more operating systems, application programs and program modules such as module 2050, data, or any other information. The storage media 2040 may be part of, or connected to, the computing machine 2000. The storage media 2040 may also be part of one or more other computing machines that are in communication with the computing machine 2000 such as servers, database servers, cloud storage, network attached storage, and so forth.

[0079] The module 2050 may comprise one or more hardware or software elements configured to facilitate the computing machine 2000 with performing the various methods and processing functions presented herein. The module 2050 may include one or more sequences of instructions stored as software or firmware in association with the system memory 2030, the storage media 2040, or both. The storage media 2040 may therefore represent examples of machine or computer readable media on which instructions or code may be stored for execution by the processor 2010. Machine or computer readable media may generally refer to any medium or media used to provide instructions to the processor 2010. Such machine or computer readable media associated with the module 2050 may comprise a computer software product. It should be appreciated that a computer software product comprising the module 2050 may also be associated with one or more processes or methods for delivering the module 2050 to the computing machine 2000 via the network 2080, any signal-bearing medium, or any other communication or delivery technology. The module 2050 may also comprise hardware circuits or information for configuring hardware circuits such as microcode or configuration information for an FPGA or other PLD.

[0080] The input/output ("I/O") interface 2060 may be configured to couple to one or more external devices, to receive data from the one or more external devices, and to send data to the one or more external devices. Such external devices along with the various internal devices may also be known as peripheral devices. The I/O interface 2060 may include both electrical and physical connections for operably coupling the various peripheral devices to the computing machine 2000 or the processor 2010. The I/O interface 2060 may be configured to communicate data, addresses, and control signals between the peripheral devices, the computing machine 2000, or the processor 2010. The I/O interface 2060 may be configured to implement any standard interface, such as small computer system interface ("SCSI"), serial-attached SCSI ("SAS"), fiber channel, peripheral component interconnect ("PCI"), PCI express (PCIe), serial bus, parallel bus, advanced technology attached ("ATA"), serial ATA ("SAT A"), universal serial bus ("USB"), Thunderbolt, Fire Wire, various video buses, and the like. The I/O interface 2060 may be configured to implement only one interface or bus technology. Alternatively, the I/O interface 2060 may be configured to implement multiple interfaces or bus technologies. The I/O interface 2060 may be configured as part of, all of, or to operate in conjunction with, the system bus 2020. The I/O interface 2060 may include one or more buffers for buffering transmissions between one or more external devices, internal devices, the computing machine 2000, or the processor 2010.

[0081] The I/O interface 2060 may couple the computing machine 2000 to various input devices including mice, touch-screens, scanners, electronic digitizers, sensors, receivers, touchpads, trackballs, cameras, microphones, keyboards, any other pointing devices, or any combinations thereof. The I/O interface 2060 may couple the computing machine 2000 to various output devices including video displays, speakers, printers, projectors, tactile feedback devices, automation control, robotic components, actuators, motors, fans, solenoids, valves, pumps, transmitters, signal emitters, lights, and so forth.

[0082] The computing machine 2000 may operate in a networked environment using logical connections through the network interface 2070 to one or more other systems or computing machines across the network 2080. The network 2080 may include wide area networks (WAN), local area networks (LAN), intranets, the Internet, wireless access networks, wired networks, mobile networks, telephone networks, optical networks, or combinations thereof. The network 2080 may be packet switched, circuit switched, of any topology, and may use any communication protocol. Communication links within the network 2080 may involve various digital or an analog communication media such as fiber optic cables, free-space optics, waveguides, electrical conductors, wireless links, antennas, radio-frequency communications, and so forth.

[0083] The processor 2010 may be connected to the other elements of the computing machine 2000 or the various peripherals discussed herein through the system bus 2020. It should be appreciated that the system bus 2020 may be within the processor 2010, outside the processor 2010, or both. According to certain examples, any of the processor 2010, the other elements of the computing machine 2000, or the various peripherals discussed herein may be integrated into a single device such as a system on chip ("SOC"), system on package ("SOP"), or ASIC device.

[0084] In situations in which the systems discussed here collect personal information about users, or may make use of personal information, the users may be provided with an opportunity or option to control whether programs or features collect user information (e.g., information about a user's social network, social actions or activities, profession, a user's preferences, or a user's current location), or to control whether and/or how to receive content from the content server that may be more relevant to the user. In addition, certain data may be treated in one or more ways before it is stored or used, so that personally identifiable information is removed. For example, a user's identity may be treated so that no personally identifiable information can be determined for the user, or a user's geographic location may be generalized where location information is obtained (such as to a city, ZIP code, or state level), so that a location of a user cannot be determined. Thus, the user may have control over how information is collected about the user and used by a content server.

[0085] Examples may comprise a computer program that embodies the functions described and illustrated herein, wherein the computer program is implemented in a computer system that comprises instructions stored in a machine-readable medium and a processor that executes the instructions. However, it should be apparent that there could be many different ways of implementing examples in computer programming, and the examples should not be construed as limited to any one set of computer program instructions. Further, a skilled programmer would be able to write such a computer program to implement an example of the disclosed examples based on the appended flow charts and associated description in the application text. Therefore, disclosure of a particular set of program code instructions is not considered necessary for an adequate understanding of how to make and use examples. Further, those skilled in the art will appreciate that one or more aspects of examples described herein may be performed by hardware, software, or a combination thereof, as may be embodied in one or more computing systems. Moreover, any reference to an act being performed by a computer should not be construed as being performed by a single computer as more than one computer may perform the act.

[0086] The examples described herein can be used with computer hardware and software that perform the methods and processing functions described herein. The systems, methods, and procedures described herein can be embodied in a programmable computer, computer-executable software, or digital circuitry. The software can be stored on computer- readable media. For example, computer-readable media can include a floppy disk, RAM, ROM, hard disk, removable media, flash memory, memory stick, optical media, magneto- optical media, CD-ROM, etc. Digital circuitry can include integrated circuits, gate arrays, building block logic, field programmable gate arrays (FPGA), etc.

[0087] The example systems, methods, and acts described in the examples presented previously are illustrative, and, in alternative examples, certain acts can be performed in a different order, in parallel with one another, omitted entirely, and/or combined between different examples, and/or certain additional acts can be performed, without departing from the scope and spirit of various examples. Accordingly, such alternative examples are included in the scope of the following claims, which are to be accorded the broadest interpretation so as to encompass such alternate examples.

[0088] Although specific examples have been described above in detail, the description is merely for purposes of illustration. It should be appreciated, therefore, that many aspects described above are not intended as required or essential elements unless explicitly stated otherwise. Modifications of, and equivalent components or acts corresponding to, the disclosed aspects of the examples, in addition to those described above, can be made by a person of ordinary skill in the art, having the benefit of the present disclosure, without departing from the spirit and scope of examples defined in the following claims, the scope of which is to be accorded the broadest interpretation so as to encompass such modifications and equivalent structures.