09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable embedded operating system software for use
across electronic control units and other
microprocessor-based devices; downloadable middleware for
real-time and deterministic scheduling of applications
across distributed computing environments; downloadable
software for integration, management, and coordination of
hardware and software components in embedded systems;
downloadable platform software for development, deployment,
and management of embedded applications. Providing temporary use of non-downloadable embedded
operating system and middleware software for use across
electronic control units and other microprocessor-based
devices; platform as a service (PaaS) featuring software for
real-time scheduling of applications across distributed
computing environments; engineering, design, and
technological consulting services in the field of
integration, management, and coordination of hardware and
software components in embedded systems; software design,
development, and customization services for embedded
applications.
2.
METHOD AND SYSTEM FOR CLOUD EXTENDED ATTRIBUTE PROFILE
A method at a connector device, the method including receiving a first message from a peripheral device, the first message being received over a short range communications protocol connection utilizing a generic reading and writing service attribute profile; repackaging data within the first message into a second message at the connector device; and transmitting the second message to a network element, the transmitting utilizing a second communications connection, wherein the repackaging data populates a field within the second message with information about an attribute profile operation.
H04W 24/02 - Arrangements for optimising operational condition
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
H04W 88/18 - Service support devicesNetwork management devices
A method at a computing device for a vehicle, the method including observing, using sensors of the vehicle, behavior of an external road user; producing at the computing device a normalized safety score for the external road user; recording identifying information for the external road user; and reporting the normalized safety score and identifying information to a server.
Systems, methods, and software can be used to identify security risks in software code based on software bill of materials (SBOM). In some aspects, a method includes: obtaining, by a server, software code and a SBOM corresponding to the software code; identifying, by the server and based on the SBOM, a library used by the software code; and generating, by the server, a risk assessment based on at least one metric corresponding to the library, where the at least one metric is associated with one or more maintainers of the library.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
42 - Scientific, technological and industrial services, research and design
09 - Scientific and electric apparatus and instruments
Goods & Services
Providing temporary use of non-downloadable embedded operating system and middleware software for use across electronic control units and other microprocessor-based devices; Platform as a Service (PaaS) featuring software for real-time scheduling of applications across distributed computing environments; Engineering, design, and technological consulting services in the field of integration, management, and coordination of hardware and software components in embedded systems; Software design, development, and customization services for embedded applications Downloadable embedded operating system software for use across electronic control units and other microprocessor-based devices; Downloadable middleware for real-time and deterministic scheduling of applications across distributed computing environments; Downloadable software for integration, management, and coordination of hardware and software components in embedded systems; Downloadable platform software for development, deployment, and management of embedded applications.
A signal catalog defines one or more vehicle signals selected from among a vehicle signal relating to a speed limit, a vehicle signal relating to a trip time, or a vehicle signal relating to regenerative braking of a vehicle. A processing resource processes the one or more vehicle signals to generate an indication relating to an operation of the vehicle.
A method at a data pipeline in computing system, the method including receiving data and a schema identifier associated with the data; confirming that the schema identifier is valid; and routing the data at the data pipeline based on the schema identifier. Also, a computing system having a processor; a data pipeline; and a communications subsystem, wherein the computing system is configured to: receive data and a schema identifier associated with the data; confirm, using the processor, that the schema identifier is valid; and route the data at the data pipeline based on the schema identifier.
In some examples, a system stores, in a memory, a signal catalog defining a vehicle signal representing a characteristic of a vehicle occupant in the vehicle. The system receives the vehicle signal defined by the signal catalog, the vehicle signal being based on measurement data from one or more sensors of the vehicle, and the system updates a preference setting of actuatable components of the vehicle based on the vehicle signal representing the characteristic of the vehicle occupant.
B60W 50/00 - Details of control systems for road vehicle drive control not related to the control of a particular sub-unit
B60W 40/08 - Estimation or calculation of driving parameters for road vehicle drive control systems not related to the control of a particular sub-unit related to drivers or passengers
G06V 20/59 - Context or environment of the image inside of a vehicle, e.g. relating to seat occupancy, driver state or inner lighting conditions
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
10.
ANGULAR MODE SYNTAX FOR TREE-BASED POINT CLOUD CODING
Method and devices for coding point cloud data using an angular coding mode. The angular coding mode may be signaled using in an angular mode flag to signal that a volume is to be coded using the angular coding mode. The angular coding mode is applicable to planar volumes that have all of their occupied child nodes on one side of a plane bisecting the volume. A planar position flag may signal which side of the volume is occupied. Entropy coding may be used to code the planar position flag. Context determination for coding may take into account angular information for child nodes or groups of child nodes of the volume relative to a location of a beam assembly that has sampled to point cloud. Characteristics of the beam assembly may be coded into a dedicated syntax in the bitstream.
A method at a first computing device providing a local traffic service, the method including detecting a vehicle is transitioning to a region of control of a second local traffic service; and providing, to a second traffic management service, priority information for the vehicle.
A method of encoding or decoding a point cloud to representing a three-dimensional location of an object, the point cloud being located within a volumetric space, the method including determining at least one closest, relative to azimuthal distance, encoded node to a current node; determining an azimuthal prediction angle for each of the at least one closest encoded node; finding an averaged azimuthal prediction angle from the determined azimuthal prediction angle for each of the at least one closest encoded node; selecting an angular azimuthal context based on the averaged azimuthal predication angle; encoding information representative of the current node based on the azimuthal context to generate the bitstream of compressed point cloud data or decoding information representative of the current node based on the azimuthal context to generate the point cloud data.
A method at a vehicle computing device for identifying a driver, the method including receiving a first indicator at the vehicle computing device; obtaining, based on the first indicator, a presumed driver identity; receiving at least one second indicator at the vehicle computing device; and verifying the presumed driver identity using the at least one second indicator.
B60R 25/24 - Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
B60R 25/045 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor by limiting or cutting the electrical supply to the propulsion unit
B60R 25/08 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on brakes or brake systems
B60R 25/10 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
B60R 25/102 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
B60R 25/31 - Detection related to theft or to other events relevant to anti-theft systems of human presence inside or outside the vehicle
B60R 25/34 - Detection related to theft or to other events relevant to anti-theft systems of conditions of vehicle components, e.g. of windows, door locks or gear selectors
In some examples, a system reads a first configuration file comprising a first configuration parameter that affects an execution of a process in a vehicle, and determines whether any update configuration file is present by checking for a storage location having an identifier based on a property of the first configuration file, the update configuration file comprising an entry specifying a change for the first configuration file. The system applies the update configuration file to the first configuration file to determine configuration parameters to apply for the process when executed in the vehicle.
A method for dynamic pairing between asset tracking devices, such as a chassis module and a chassis sensor module mounted on a chassis and a container module mounted on a container. The method includes detecting presence of the container using the chassis sensor module and in response, broadcasting a short-range polling signal; establishing a wireless connection with the container module in response to the short-range polling signal; obtaining GNSS data; determining an estimated distance between the chassis module and the container module; and transmitting the GNSS data and the estimated distance to a remote server.
A system and method for switching the operating mode of a controller based on the detection of a magnetic field, and in response to having detected a change in the presence of the magnetic field, sending a message to the remote server.
Systems, methods, and software can be used to determine risks of software files. In some aspects, a method includes: obtaining an input, wherein the input comprises a binary file; determining a second set of feature vectors of the input; performing a canonical correlation analysis (CCA) on the second set of feature vectors and a first set of feature vectors to obtain a first vector and a second vector; calculating a correlation coefficient value of the first vector and the second vector; obtaining a third set of feature vectors based on the correlation coefficient value; and providing, based on the third set of feature vectors, information indicating a level of a security risk of the input and information indicating features associated with the security risk of the input.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing event log data. An example event log processing method includes receiving an event log comprising a plurality of event records describing events that have occurred on each of one or more computer systems over a period of time; converting the event log into a graph, comprising: normalizing the plurality of event records, including anonymizing a unique identifier value in each event record and replacing a variable value in each event record with a predetermined value; representing each normalized event record as one or more nodes in the graph; and generating a plurality of event clusters, wherein each event cluster includes an aggregated group of nodes and is generated based on common attributes of and hierarchical relationships between the normalized event records represented by the nodes in the aggregated group.
Systems, methods, and software can be used to determine risks of software files. In some aspects, a method includes: obtaining an input, wherein the input comprises a binary file; determining a second set of feature vectors of the input; performing a canonical correlation analysis (CCA) on the second set of feature vectors and a first set of feature vectors to obtain a first vector and a second vector; calculating a correlation coefficient value of the first vector and the second vector; obtaining a third set of feature vectors based on the correlation coefficient value; and providing, based on the third set of feature vectors, information indicating a level of a security risk of the input and information indicating features associated with the security risk of the input.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
21.
INTRISICALLY SAFE DESIGNED DEVICES AND METHODS THEREFOR
Encapsulating components and millimeter-wave waveguides coupled to a circuit board to satisfy intrinsically safe requirements and methods therefor. The top side of the circuit board is divided into a plurality of zones using a plurality of fences formed by the housing of the apparatus. The plurality of zones, and the components and millimeter-wave waveguide therein, are filled with potting material.
A method for malware analysis comprising: disassembling executable code to create disassembled instructions; extracting instruction blocks from the disassembled instructions; encoding the instruction blocks to create encoded instruction blocks and generating a first data graph, wherein the first data graph comprises nodes, each node from the first data graph being associated with an encoded instruction block; determining for each node an embedding of the encoded instruction block to create a canonical executable graph; classifying the canonical executable graph into either a benign family or a malicious family; and determining that the executable code is a malware when the canonical executable graph belongs to a malicious family.
In some examples, a memory stores a representation including entries that represent respective features of a vehicle, where a first entry of the entries in the representation represents a first feature of the vehicle, and the first entry is associated with an indicator settable to a first value to indicate that the first entry is active for the vehicle, and to a different second value to indicate that the first entry is inactive for the vehicle.
An asset detection device and method of using a mmWave radar to determine whether a container is mounted to a transport chassis. The reflected signal may include multiple peaks and may be ambiguous. The device may determine if a peak is within a container range and is above a threshold magnitude. If the peak is not the highest peak in the reflected signal the device may disambiguate the signal by filtering it using a stored average no-container signal. If the peak is not the highest peak in the reflected signal the device may disambiguate the signal by determining if the highest peak is due to multipath. In some cases no peaks may be both above the threshold and within the container range, in which case the device determines there is no container present. The device reports container status determinations and reflected signal analysis to a remote server.
In some examples, a memory stores a representation including entries that represent respective features of a vehicle, where a first entry of the entries in the representation represents a first feature of the vehicle, and the first entry is associated with an indicator settable to a first value to indicate that the first entry is active for the vehicle, and to a different second value to indicate that the first entry is inactive for the vehicle.
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
G07C 5/00 - Registering or indicating the working of vehicles
26.
SYSTEM AND METHOD FOR MULTI-CARRRIER NETWORK OPERATION
Methods, devices, and systems for multi-carrier network operation are disclosed. In one embodiment, a method of performing channel scrambling in a multi-carrier network, wherein the multi-carrier network includes a first component carrier (“CC”) and a second CC between a base station and a user equipment (“UE”) comprises receiving a Cell Radio Network Temporary Identifier (“C-RNTI”) and a cell identification (“ID”) for at least one of the first CC and the second CC; and using the RNTI and the cell ID to perform scrambling of information transmitted on at least one of the first CC and the second CC.
Systems, methods, and software can be used to provide credentials for a provisioning operation. In some aspects, a method includes: generating, by a first operating system (OS), a first transfer key; sending, from the first OS to a second OS, a random salt by using the first transfer key; generating, by the first OS, a second transfer key by using the random salt; and sending, from the first OS to the second OS, provisioning credentials by using the second transfer key.
A method at a computing device, the method including sending a request for information to a second entity; and receiving a response providing the information, the response further specifying the unit that the information is provided in. The measurement unit may be appended as a separate branch for a signal, a name for a signal, using a separator for the signal, or a combination thereof.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
29.
METHOD AND SYSTEM FOR DECOUPLING CHARGING SIGNALS FROM BATTERY SIGNALS
A method at a computing device, the method including sending a request to a vehicle communications subsystem to determine a number of charging ports on a vehicle; receiving a response providing the number of charging ports on the vehicle; sending a request to the vehicle communications subsystem to find batteries associated with each charging port; and receiving a response identifying batteries associated with each charging port.
B60L 58/12 - Methods or circuit arrangements for monitoring or controlling batteries or fuel cells, specially adapted for electric vehicles for monitoring or controlling batteries responding to state of charge [SoC]
B60L 58/20 - Methods or circuit arrangements for monitoring or controlling batteries or fuel cells, specially adapted for electric vehicles for monitoring or controlling batteries of two or more battery modules having different nominal voltages
B60R 16/033 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided forArrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for supply of electrical power to vehicle subsystems characterised by the use of electrical cells or batteries
30.
RISK-AWARE ACCESS CONTROL SYSTEM AND RELATED METHODS
A risk-aware access control system and related methods are provided. In accordance with one aspect of the present disclosure, there is a provided a method of risk-aware access control, comprising: detecting a request to perform an action with respect to two factors, the factors being of a factor type selecting people, devices, documents, and location, wherein the factors are of a different factor type; determining a coupling associated with the requested action based on the factors of the requested action; determining a risk level associated with the coupling; denying the requested action in response to a determination that the risk level does not match a security policy; and allowing the requested action in response to a determination that the risk level matches the security policy.
A method at a computing device including fragmenting a malware sample into a plurality of byte strings, each of the plurality of byte strings having a predetermined length; embedding each of the plurality of byte strings in an embedding network to generate a plurality of embeddings; for each embedding in the plurality of embeddings, finding a nearest neighbor; and setting a predicted family for the malware sample based on a fusion of the nearest neighbor for each of the plurality of embeddings.
In some examples, a sensor service receives an indication of interest from a client for sensor data of a first sensor of the plurality of sensors, and allocates buffers in the memory for the plurality of sensors. The sensor service provides a first buffer to a sensor connector that is to receive the sensor data from the first sensor, and receives, from the sensor connector, an indication that the first buffer in the memory has been written with the sensor data from the first sensor. Based on the indication of interest from the client, the sensor service notifies the client that the first buffer is available for reading by the client from the memory.
A method at an analytics module on a computing device, the analytics module being at a tier within a hierarchy of analytics modules and data sources, the method including receiving a first data set from a data source or a lower tier analytics module; analyzing the first data set to create a second data set; providing the second data set to at least one higher tier analytics module, the second data set being derived from the first data set; and providing at least one of an inference and an interdiction to the lower tier analytics module
A method of encoding or decoding a point cloud for representing a three-dimensional location of an object, the point cloud being generated by a device comprising a plurality of beam emitters. The method comprises using information from the beam emitter such as the angle of each beam emitter, and the azimuthal distance between each point capture, to more efficiently represent the point cloud data.
A method of encoding or decoding a point cloud for representing a three-dimensional location of an object, the point cloud being generated by a device comprising a plurality of beam emitters. The method comprises using information from the beam emitter such as the location and angle of each beam emitter to more efficiently represent the point cloud data.
A method for processing a control channel at a user agent (UA) to identify power control commands within a wireless communication system, the method comprising the steps of, at a user agent, monitoring for power control messages on a single carrier, decoding a message received on the single carrier to generate decoded information and using the decoded information to identify a power control command for each of at least first and second carriers.
In some examples, a vehicle includes a steering system having a user-operated steering control configured to steer the vehicle. The vehicle includes a controller independent of the steering system and configured to receive an indication that the steering system employs dynamic steering angle ratio adjustment of the steering control, and modify an operation of the controller based on the indication.
There is provided a method to validate that a synthetic sensor or other application can operate in a computing environment of a vehicle. The synthetic sensor specifies, in a manifest, which sensors of the vehicle it will be reading signals from. The synthetic sensor manifest is enhanced by adding to it an extended universal identifier that carries semantic information. This identifier may then be compared to unique identifiers in a signal catalog of a vehicle to ensure that the sensors of the vehicle will provide information with semantics that are expected by the synthetic sensor.
B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided forArrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
In some examples, a sensor service receives an indication of interest from a client for sensor data of a first sensor of the plurality of sensors, and allocates buffers in the memory for the plurality of sensors. The sensor service provides a first buffer to a sensor connector that is to receive the sensor data from the first sensor, and receives, from the sensor connector, an indication that the first buffer in the memory has been written with the sensor data from the first sensor. Based on the indication of interest from the client, the sensor service notifies the client that the first buffer is available for reading by the client from the memory.
In some examples, a system includes a kernel scheduler to schedule, for execution, threads to run in an address space of an operating system (OS) kernel according to respective priorities associated with the threads, where each thread of the threads has a user persona and a kernel persona. The kernel scheduler switches each respective thread of the threads to the kernel persona of the respective thread in response to scheduling the respective thread for execution responsive to a kernel call from the respective thread. The kernel scheduler preempts a thread in the kernel persona of the thread that is actively executing in response to an event.
Methods and systems for dynamically routing pulse-code modulated (PCM) audio subchannels to one or more sink devices using a software-based router. The PCM router may set a pre-conversion buffer in the conversion path to a sink device for a particular subchannel if the source PCM fragment size differs from the sink fragment size. It may also compare characteristics of the audio subchannel to the sink device to identify a mismatch and, on that basis, configure the conversion path to include a sample rate converter, a channel converter, or a format converter, as needed. Subchannels can be dynamically routed to two or more sink devices and routing may be changed during playback.
G10L 19/005 - Correction of errors induced by the transmission channel, if related to the coding algorithm
G10L 19/008 - Multichannel audio signal coding or decoding using interchannel correlation to reduce redundancy, e.g. joint-stereo, intensity-coding or matrixing
H04H 60/04 - Studio equipmentInterconnection of studios
42.
METHODS AND SYSTEMS FOR GENERATING DESCRIPTION FOR ASSEMBLY FUNCTIONS
A method for creating a model to add a code summary to functions of assembly language code, the method including tokenizing an assembly code dataset; inputting the tokenized assembly code dataset to a pre-trained transformer-based model; using an encoder to create fixed length embeddings; and using a decoder on the fixed length embeddings to generate the code summary.
In some examples, a system detects a first alert associated with activities of a first group of entities, the first alert generated by a first type of security agent. The system predicts an alert collection including one or more alerts expected to occur based on occurrence of the first alert, wherein a second alert of the alert collection is from a second type of security agent different from the first type of security agent. The system generates one or more remediation actions to apply in response to a pattern of alerts including the first alert and the one or more alerts of the alert collection. The system provides, in an electronic device to be protected against attacks, information of the one or more remediation actions to be applied by the electronic device responsive to occurrence of the pattern of alerts.
A method at a computing device for providing vehicle data to a client, the method including receiving a data object at an ingestor block at the computing device, the ingestor block comprising a plurality of ingestor instances capable of interacting with different entities; converting the data object to a frame; providing the frame to a translation stack at the computing device to convert the frame into a normalized message; and providing the normalized message to the client.
A method at a computing device, the method including receiving, at the computing device, sensor data from a data source; converting, at a playback tool on the computing device, the sensor data into converted data, thereby bypassing abstraction layers at the computing device; and providing the converted data to at least one synthetic sensor on the computing device, wherein each of the at least one synthetic sensor provides an insight regarding operation of the computing device.
In some examples, a system includes an operating system (OS) kernel, one or more hardware processors, and a kernel scheduler. The kernel scheduler receives a first indication that a first thread is to wait for an event, receives a second indication that the first thread has transitioned to a blocked state in which the first thread is blocked on the event, and receives a third indication from a second thread delivering the event, the third indication to unblock the first thread. In response to the third indication, the kernel scheduler causes a transition of the first thread from the wait state to an active state if the first thread is in the wait state and has not yet transitioned to the blocked state, and causes a transition of the first thread from the blocked state to a ready state if the first thread is in the blocked state.
In some examples, a system includes one or more hardware processors, an interrupt service thread to handle an interrupt, and a kernel scheduler to schedule the interrupt service thread as part of a collection of threads to be scheduled.
There are provided methods and apparatuses for a control flow execution-guided deep learning framework for binary code vulnerability detection. Reinforcement learning is to enhance the branching decision at every program state transition and create a dynamic environment to learn the dependency between a vulnerability and certain program states. An implicitly defined neural network enables state transition until convergence, which captures the structural information at a higher level.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
In some examples, a system monitors operations in at least one electronic device in which entities are started, created, or modified, and generates an alert based on the monitoring. The system adapts an amount of data collected based on contextual information associated with the alert, where the adapting of the amount of data collected comprises determining whether to include or exclude data associated with a subset of the entities based on any relationships of the subset of the entities to an entity associated with the alert.
Methods and systems for controlling an asset tracking device and, in particular, determining when an asset tracking device attached to a trailer is in close proximity to a truck. The device may enter a sleep mode when the trailer has been coupled to a truck with an electronic logging device (ELD). Thereafter, the device ceases obtaining a GPS location and transmitting the location to a central server. While the trailer and truck remain coupled, the device leverages the ELD by using it to send its GPS location to the central server and therefore, prolong its battery life.
In some examples, a security system detects an alert generated in response to an operation on a device, the operation involving a first process and a first entity. In response to the alert, the security system discovers a second entity that is outside a scope of the alert, and applies remediation actions with respect to the first process, the first entity, and the second entity to address the alert.
A device includes a link layer configured to use a first link layer address and a second link layer address, maintain the first link layer address unchanged for a duration of an association of the device with a wireless network, and change the second link layer address from a first value to a second value during the duration.
A method for natural language processing of a corpus of documents, the method including evaluating the corpus of documents to choose a plurality of topics, using the plurality of topics to generate a topic of topics; and assessing the topic of topics to determine a quality of the natural language processing of the corpus.
A method for natural language processing of a corpus of documents, the method including evaluating the corpus of documents to choose a plurality of topics, using the plurality of topics to generate a topic of topics; and assessing the topic of topics to determine a quality of the natural language processing of the corpus.
A method at a sensor module within a sensor system for communicating with a gateway, the method including storing a timing profile for communications with the gateway; waking a radio core of the sensor module at a threshold time prior to a beacon signal being expected from the gateway; sampling a channel for the beacon signal at the radio core; if the beacon signal is detected: waking a processor on the sensor module; exchanging communication with the gateway; and powering down the processor and radio core upon completion of the exchanging communication.
A method at a computing device within an Intelligent Transportation System, the method including detecting a traffic event at the computing device; determining no fixed roadside unit is available from the computing device; establishing an Internet Protocol connection from the computing device to a network node; and sending a traffic event message from the computing device to the network node, the traffic event message providing information for the traffic event.
G08G 1/0967 - Systems involving transmission of highway information, e.g. weather, speed limits
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
57.
METHODS AND DEVICES FOR TREE SWITCHING IN POINT CLOUD COMPRESSION
Methods and devices for coding point cloud data using volume trees and predicted-point trees. In one embodiment of the disclosure, a method of encoding a point cloud data to generate a bitstream of compressed point cloud data representing a three-dimensional location of a physical object is provided, the point cloud data being located within a volumetric space. The method includes compressing a first part of the point cloud data represented by a first tree of a first type; determining for a given node of the first tree if an assignation to a second type of tree is enabled, said given node still being processed for the first tree; when the assignation is enabled, compressing a second part of the point cloud data represented by a second tree of the second type wherein, features associated with a root node of the second tree are at least partially obtained from the given node.
Systems, methods, and software can be used to determine whether a local area network (LAN) is secure. In some aspects, a method includes: determining, by an electronic device that is connected to a local area network (LAN), whether the LAN meets a security condition, wherein the determining whether the LAN meets a security condition comprises: determining whether an Internet Protocol (IP) address of a reference server in a security list is included in a range indicated by a subnet mask of the LAN; and determining whether a hostname of a device at the IP address matches a hostname corresponding to the reference server in the security list; and determining whether to initiate a secured network connection based on whether the LAN meets the security condition.
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
59.
Tamper detection for intrinsically-safe or explosion-proof enclosures
Devices and methods for detecting and reporting a battery tamper event with regard to an intrinsically-safe or explosion-proof device while the device is located in a hazardous environment. The device may include a location sensor for determining that the device is in a hazardous location. While in the hazardous location, the device may detect an open enclosure event using a sensor and, if so, it may monitor for detection of a battery tampering event. The battery tampering event may include battery replacement or battery charging. The battery tamper event may be reported to a remote server over a wireless channel when it occurs.
H05K 5/02 - Casings, cabinets or drawers for electric apparatus Details
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations
In some examples, a system receives information based on wireless sensing performed using wireless signals of a wireless interface of a wireless node, the wireless interface of the wireless node to communicate data over a wireless connection established with another wireless device. The system performs authentication in response to the received information.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Systems, methods, and software can be used to perform a two-factor authentication. In some aspects, a method includes: receiving, by an electronic device from a device authentication server, a two-factor authentication (2FA) token; transmitting, by the electronic device to an identity provider (IDP), an authentication request for a 2FA operation, wherein the authentication request comprises the 2FA token; receiving, by the electronic device from the IDP, an authentication response; and determining, by the electronic device, whether the 2FA operation succeeds based on the authentication response.
A method at a remote proxy on a first node, the method including receiving, at the remote proxy, a first message from a first module on the first node, the first message being directed to a second module on a second node; verifying the first message at the remote proxy utilizing operating system verification; determining, based on a manifest at the remote proxy, the second node; signing, using a private key for the first node, the first message; and sending the first message to the second node.
A method at a computing device, the method including receiving an indication of a desired test environment; accessing a configuration catalog to obtain configuration information for the desired test environment; configuring a test node based on the configuration information; obtaining test signals for the desired test environment; and performing testing on the configured test node using the test signals.
A method at a computing device, the method including placing a trace on a plurality of behaviors within a kernel on the computing device; generating data from the trace; assembling the data into an event; and formatting the event into a security sensor output. Further, a computing device having a processor and communications subsystem, wherein the computing device is configured to place a trace on a plurality of behaviors within a kernel on the computing device; generate data from the trace; assemble the data into an event; and format the event into a security sensor output.
A method at a computing device, the method including receiving security sensor data; normalizing the security sensor data to create normalized security sensor data; determining that an anomaly exists within the normalized security sensor data; and generating an alert based on the determining. Also, computing device comprising a processor, and a communications subsystem, where the computing device is configured to receive security sensor data; normalize the security sensor data to create normalized security sensor data; determine that an anomaly exists within the normalized security sensor data; and generate an alert based on the determining.
A method at a first domain for obtaining at least one insight from a second domain, the method including synchronizing a permissions table at the first domain with a master permissions table at a network element; receiving a request for an insight from an application at a bridge in the first domain; confirming an identity of the application; verifying, at the bridge, application permissions using the permissions table at the first domain, the verifying confirming that the application has permission to access the insight; sending a request message from the first domain to the second domain, the request message being signed by a private key of the first domain and requesting the insight; and receiving the insight from the second domain.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
Methods and systems for building a coverage map for a mobile network operator based on a plurality of location reports received from a plurality of deployed asset tracking devices, the reports including geolocation data and mobile network identifiers. On request from a user device the coverage map is used to generate an overlay atop a geographical map showing the boundaries of coverage for that mobile network operator.
Systems, methods, and software can be used to control permissions of vehicle signals. In some aspects, one example method includes: receiving a permission map, wherein the permission map comprises a configured permission value of a permission element of a node in a vehicle signal catalog; and setting a permission value of the permission element of the node in the vehicle signal catalog according to the configured permission value in the permission map.
A method of controlling a portable electronic device that has a touch-sensitive display includes displaying information on the touch-sensitive display, detecting a gesture on the touch-sensitive display, scrolling through the information in a first scrolling mode when the gesture is associated with a first area of the touch-sensitive display, and scrolling through the information in a second scrolling mode when the gesture is associated with a second area of the touch-sensitive display.
G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
G06F 3/04886 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
70.
System and method for supporting inter-band carrier aggregation with different UL/DL TDD configurations
In some implementations, a method of wireless communications between a wireless communications network and wireless user equipment includes receiving, using a primary Time Division Duplex (TDD) configuration, data on a primary component carrier in a first frequency band. Using a secondary TDD configuration, data on a secondary component carrier is received in a second frequency band different from the first frequency band. A Hybrid Automatic Repeat Request (HARQ) for data received on the secondary component carrier is transmitted using a supplemental TDD configuration. A transmission or retransmission on the secondary component carrier uses a supplemental TDD configuration as well. The supplemental TDD configuration is different from the secondary TDD configuration. Furthermore, an uplink supplemental configuration may be different from a downlink supplemental configuration.
H04W 72/23 - Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
H04J 3/16 - Time-division multiplex systems in which the time allocation to individual channels within a transmission cycle is variable, e.g. to accommodate varying complexity of signals, to vary number of channels transmitted
An asset tracking device and method for detecting the presence of an intermodal shipping container and responsively selecting a preferred location determination. The device may include a controller, a sensor coupled to the controller, a global navigation satellite system chip, and a cellular signal transceiver. While not detecting a container, the controller obtains location data via a global satellite system chip. While a container is detected, the sensor sends a detection signal to the controller and, responsive to the detection signal, the controller obtains location data from a cellular signal transceiver and not from the global satellite system chip.
Methods and systems for automatically selecting a mobile network rate plan for an asset tracking device based on a set of reported geolocations of the device overtime, coverage data for various mobile networks, and a set of possible network rate plans. A change in mobility rate plans may be implemented through remote provisioning of a new mobile network profile to the asset tracking device.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
H04L 41/0833 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for reduction of network energy consumption
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
73.
COMMUNICATING VEHICLE SIGNAL INFORMATION USING EXTENDED IDENTIFIERS
Systems, methods, and software can be used to communicates vehicle signals. In some aspects, one example method includes: receiving, at a server, a query for a vehicle signal; and transmitting, from the server, a response message comprising an identifier of the vehicle signal, wherein the identifier comprises a representation of a name of the vehicle signal and a definition of at least one other element of the vehicle signal.
G07C 5/00 - Registering or indicating the working of vehicles
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
74.
OCEAN-TRAVEL CONFIGURATION OF ASSET TRACKING DEVICES
Methods and systems for controlling an asset tracking device and, in particular, determining when an asset tracking device is aboard a ship. The device may have a ship mode in which the device determines it has been loaded onto a ship and in which geolocation is not determined. The device may further have an ocean mode to which it transitions from the ship mode in which it ceases to look for a cellular connection in order to send location reports. The device may detect a beacon signal from a ship-mounted base-station to trigger the ship mode and may detect, or fail to detect, one or more wireless signals or identifiers as the trigger to transition to ocean mode.
Systems, methods, and software can be used to process a control channel at a user agent (UA) within a wireless communication system. In some aspects, the method includes identifying one carrier as an anchor carrier and at least one other another carrier as a non-anchor carrier; for each carrier: determining a location of a UA specific search space including one or more control channel candidates for the carrier based on a linear congruential random number; and attempting to decode each of the control channel candidates in the UA specific search space to identify at least one of an uplink or a downlink grant associated with the carrier and receiving information indicating a first number of control channel candidates for a first aggregation level for the anchor carrier and a second number of control channel candidates for the first aggregation level for the non-anchor carrier, wherein the first number of control channel candidates is different from the second number of control channel candidates.
A method at a network element, the method including receiving at least one message at the network element, the at least one message being one or both of: an update status information message from an updates server; and an anomaly detection status information message from anomaly detection server; determining, based on the receiving the at least one message, a dynamic cybersecurity posture indication for an intelligent transportation system entity; and providing the dynamic cybersecurity posture indication for the intelligent transportation system entity to an Enrolment Authority, wherein the dynamic cybersecurity posture indication can be included in a certificate relating to the intelligent transportation system entity.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
In some examples, a system accesses service facility information relating to a plurality of vehicle service facilities, and determines, based on the vehicle component information and the service facility information, at least one vehicle service facility of the plurality of vehicle service facilities that is able to perform servicing of the one or more vehicle components. The system causes presentation, in a user interface, of service information relating to vehicle component servicing to be provided by the at least one vehicle service facility.
Systems, methods, and software can be used to detect distribution assessments of production data sample of a machine learning operation. In some aspects, a method includes: receiving, from a first machine learning model, pre-activation data, wherein the pre-activation data comprises pre-activation information of one or more neurons of the first machine learning model, and the pre-activation data is obtained when the first machine learning model processes a production data sample to generate a prediction outcome; using, a second machine learning model to process the pre-activation data to generate a distribution assessment; and determining, based on the distribution assessment, wherein the production data sample is an adversarial data sample or a drift data sample.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
79.
Method and system for crowd sourced dangerous driving detection and accident mitigation
A method at a computing device for a vehicle, the method including observing, using sensors of the vehicle, behavior of an external road user; producing at the computing device a normalized safety score for the external road user; recording identifying information for the external road user; and reporting the normalized safety score and identifying information to a server.
A method at a permission service on a computing device for managing permissions, the method including receiving a request at the permission service from a first application, the request comprising an identifier associated with an operating system for a second application and a permission for the second application to access resources; performing an action at the permission service based on the received request; and returning results of the action to the first application indicating whether the second application has the permission to access the resources.
mode and one or more preconfigured audio zone profiles; and controlling, by the vehicle, audio equipment of the vehicle to output audio according to the plurality of audio output levels.
A method at a first domain for obtaining at least one insight from a second domain, the method including registering an application with an anchor in the first domain; providing, from the anchor to the application, a first message signed by the anchor; sending, from the first domain to a network domain, the signed message; receiving, from the network domain, at least one signed token, each of the at least one signed token being for a synthetic sensor on the second domain, where the synthetic sensor provides an insight; sending a request message to the second domain, the request message requesting the insight and including the at least one token; and receiving the insight from a synthetic sensor associated with the at least one token.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
Methods and devices for encoding a point cloud. More than one frame of reference is identified and a transform defines the relative motion of a second frame of reference to a first frame of reference. The space is segmented into regions and each region is associated with one of the frames of reference. Local motion vectors within a region are expressed relative to the frame of reference associated with that region. Occupancy of the bitstream is entropy encoded based on predictions determined using the location motion vectors and the transform associated with the attached frame of reference.
H04N 19/184 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being bits, e.g. of the compressed video stream
H04N 19/52 - Processing of motion vectors by encoding by predictive encoding
84.
INTERNET-OF-THINGS DEVICES AND METHODS OF CONTROLLING POWER THERETO
An Internet of Things device and method for controlling the flow of power to a device through remote instructions. The device may include a battery and a switch coupling the battery to a main circuit, the switch including a sensor detecting a first condition. While detecting the first condition, the switch may be open-circuited, decoupling the battery from the main circuit. While not detecting the first condition, the switch is close-circuited, coupling the battery to the main circuit and providing power. The device may further include a controller coupled to a wireless communications module, which may receive instructions from a remote server. These instructions may instruct the controller to send a disable signal to the switch, preventing the switch from becoming open-circuited when the sensor detects the first condition.
G06F 21/81 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
G06F 1/28 - Supervision thereof, e.g. detecting power-supply failure by out of limits supervision
85.
METHOD AND SYSTEM FOR INCREMENTAL CENTROID CLUSTERING
A method at a computing device for anomaly detection, the method including storing, at the computing device, a full batch model for a plurality of data points, wherein each of the plurality of data points is associated with one of a plurality of clusters, and wherein the storing comprises a table for storing information about the plurality of clusters without storing the plurality of data points; receiving a new data point from a hardware sensor; determining that the new data point falls outside the full batch model, thereby detecting an anomaly; and performing an action based on the anomaly.
In some examples, in response to determining that a new communication channel is required, a wireless device retrieves information provided from a network node of availability of alternative communication channels for the wireless device. In response to retrieving information that a second communication channel is available for a location within which the wireless device is located, the wireless device removes wireless device specific information and initiates a request to connect to the second communication channel, where the second communication channel is in a frequency range different from a frequency range of the first communication channel.
A method, mobile device (101) and radio access network RAN (102) are disclosed for suspending and re-establishing a radio resource control (RRC) connection. In some examples, the mobile device (101) indicates a preference to have the RRC connection either suspended or released. In other examples, RAN (102) sends to the mobile device (101) a connection suspend command message instructing the mobile device to suspend a RRC connection with the RAN (102). The mobile device (101), in response to the connection suspend command message, suspends the RRC connection. When the RRC connection is suspended the mobile device (101) cannot transmit or receive user plane data to the RAN (102) and performs functions the same as or similar to idle mode functions. On suspension, RRC connection information is stored and can be used to re-establish the suspended RRC connection.
A method for reporting power headroom-related information for a plurality of aggregated carriers. The method includes reporting in a bitmap the power headroom-related information for a number of the aggregated carriers that is less than or equal to the total number of aggregated carriers, wherein the power headroom-related information is one of a power headroom for at least one of the aggregated carriers and a path loss for at least one of the aggregated carriers.
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04W 52/24 - TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
H04W 52/34 - TPC management, i.e. sharing limited amount of power among users or channels or data types, e.g. cell loading
H04W 72/20 - Control channels or signalling for resource management
H04W 72/21 - Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
A method at a computing device within an Intelligent Transportation System, the method comprising: determining, at the computing device, whether a short-term certificate is available to sign a message; if the short-term certificate is available, signing the message with a private key associated with the short-term certificate; if the short-term certificate is not available, signing the message with a private key associated with a long-term certificate; and sending the message to a recipient.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
92.
Access restriction of vehicle-associated information
In some examples, a system receives vehicle-associated information from a data source associated with a vehicle, and restricts access to the vehicle-associated information based on at least one privacy criterion selected from among a machine learning use criterion relating to use of the vehicle-associated information by a machine learning model, a vehicle motion criterion relating to a movement status of the vehicle, or a person identity criterion relating to an identity of a person in the vehicle.
There is provided a method and apparatus for identifying malicious code. The method uses machine learning to compare a new code segment to known code segments of malicious code. Code segments are converted to vectors and the cosine similarity of two vectors is used to identify clones. Techniques to train a neural network for handling very long code sequences and obfuscated malicious code are used.
A risk-aware access control system and related methods are provided. In accordance with one aspect of the present disclosure, there is a provided a method of risk-aware access control, comprising: detecting a request to perform an action with respect to two factors, the factors being of a factor type selecting people, devices, documents, and location, wherein the factors are of a different factor type; determining a coupling associated with the requested action based on the factors of the requested action; determining a risk level associated with the coupling; denying the requested action in response to a determination that the risk level does not match a security policy; and allowing the requested action in response to a determination that the risk level matches the security policy.
A method at an asset tracking device, the method including activating a receiver at the asset tracking device; obtaining an intelligent transportation system message using the receiver; determining a position from the intelligent transportation system message; and reporting the determined position to a remote server.
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations
H04W 4/02 - Services making use of location information
H04W 4/029 - Location-based management or tracking services
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
96.
Enabling single radio voice call continuity (SRVCC) in a second access when a user equipment (UE) is using a first access
A server-implemented method is disclosed. The method includes: receiving a request from an IP Multimedia Subsystem (IMS) network node of an IMS network; and in response to receiving the request, providing NAS registration state information associated with a user equipment (UE) to the IMS network node, the NAS registration state information indicating at least one of fourth-generation (4G) single radio voice call continuity (SRVCC) capability of the UE or fifth-generation (5G) SRVCC capability of the UE that is applicable when using an access network supported by a core network, wherein the server is configured to store separate instances of UE SRVCC capabilities, the separate instances including indications of at least one of 4G UE SRVCC capability or 5G UE SRVCC capability that is applicable when using the access network supported by the core network, and wherein the UE is registered with the IMS network using a session initiation protocol (SIP) via the access network.
A method at a computing device including obtaining a first container image from a host computing device; executing a second container image at the computing device, the executing comprising: starting a container from the first container image, the container being for a development environment on the computing device; and customizing the container for a local environment on the computing device, thereby creating a customized container; and compiling developed code within the customized container.
A method at a Supplementary Data Provider within an emergency services network, the method including receiving a message at the Supplementary Data Provider, the message including an identifier and incident data; responsive to receiving the message, creating a resource at the Supplementary Data Provider based on the incident data, the resource being associated with the identifier; receiving an access request from an Emergency Services Provider for Supplementary Data associated with the resource; and responsive to receiving the access request, providing a response with the Supplementary Data.
A computer-implemented method for applying user settings to a vehicle is provided. The method includes receiving user settings for a first vehicle, at a second vehicle, and locking access to the user settings on the second vehicle. The user settings being associated with a user. The method includes unlocking access to the user settings on the second vehicle based on: authenticating a user token associated with the user and the user settings, and verifying an identity of the user associated with the user token, and applying the user settings to the second vehicle based on synthesizing the user settings of the first vehicle to the second vehicle.
B60R 25/01 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
B60R 16/037 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided forArrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for occupant comfort
B60R 25/24 - Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
In some examples, a first device receives a stream of application audio data, encodes the stream of application audio data, and in response to detecting an end of the stream of application audio data, provides pre-encoded filler audio data from a buffer in the first device as an encoded stream of filler audio data. The first device transmits the encoded stream of application audio data and the encoded stream of filler audio data in an encoded output data stream over a transport to a second device.
H04H 60/11 - Arrangements for counter-measures when a portion of broadcast information is unavailable
G10L 19/005 - Correction of errors induced by the transmission channel, if related to the coding algorithm
G10L 19/008 - Multichannel audio signal coding or decoding using interchannel correlation to reduce redundancy, e.g. joint-stereo, intensity-coding or matrixing
G10L 19/02 - Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocodersCoding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using spectral analysis, e.g. transform vocoders or subband vocoders