G06F3/08

METHOD FOR IMPROVING THE ACCURACY OF A CONVOLUTION NEURAL NETWORK TRAINING IMAGE DATA SET FOR LOSS PREVENTION APPLICATIONS

Techniques for improving the accuracy of a neural network trained for loss prevention applications include identifying physical features of an object in image scan data, cropping indicia from the image scan data, and examining physical features in the indicia-removed image scan data using a neural network to identify the object based on comparison of identification data based on the physical features and other identification, such as based on the indicia. In response to a match prediction, indicating a match and generating an authenticating signal.

METHOD FOR IMPROVING THE ACCURACY OF A CONVOLUTION NEURAL NETWORK TRAINING IMAGE DATA SET FOR LOSS PREVENTION APPLICATIONS

Techniques for improving the accuracy of a neural network trained for loss prevention applications include identifying physical features of an object in image scan data, cropping indicia from the image scan data, and examining physical features in the indicia-removed image scan data using a neural network to identify the object based on comparison of identification data based on the physical features and other identification, such as based on the indicia. In response to a match prediction, indicating a match and generating an authenticating signal.

Processor with memory array operable as either cache memory or neural network unit memory

A processor comprising a mode indicator, a plurality of processing cores, and a neural network unit (NNU), comprising a memory array, an array of neural processing units (NPU), cache control logic, and selection logic that selectively couples the plurality of NPUs and the cache control logic to the memory array. When the mode indicator indicates a first mode, the selection logic enables the plurality of NPUs to read neural network weights from the memory array to perform computations using the weights. When the mode indicator indicates a second mode, the selection logic enables the plurality of processing cores to access the memory array through the cache control logic as a cache memory.

Semiconductor memory device and method of erasing data of partial page and overwriting partial page with predetermined data
10658042 · 2020-05-19 · ·

A semiconductor memory device and method of erasing data are disclosed. In one example, a semiconductor memory device includes a block including a plurality of pages and a controller that controls writing, erasing, and reading of data. Each of the pages includes a plurality of memory cells each being changeable to a number of states. In a case of erasing only a partial page of the plurality of pages, the controller overwrites the partial page with predetermined data that causes state change only by one stage.

Semiconductor memory device and method of erasing data of partial page and overwriting partial page with predetermined data
10658042 · 2020-05-19 · ·

A semiconductor memory device and method of erasing data are disclosed. In one example, a semiconductor memory device includes a block including a plurality of pages and a controller that controls writing, erasing, and reading of data. Each of the pages includes a plurality of memory cells each being changeable to a number of states. In a case of erasing only a partial page of the plurality of pages, the controller overwrites the partial page with predetermined data that causes state change only by one stage.

Methods, apparatus, and systems for controlling internet-connected devices having embedded systems with dedicated functions

Systems, apparatus, and methods are disclosed for controlling internet-connected devices having embedded systems with dedicated functions. A lightweight software that protects the internet-connected devices from security breaches and security threat is installed on the internet-connected devices. The lightweight software sends network traffic data to a management server via one or more rendezvous servers. The management server analyzes the network traffic data and generates a security update. The security update is posted on a blockchain. The lightweight software obtains the security update in the form of a blockchain transaction.

Methods, apparatus, and systems for controlling internet-connected devices having embedded systems with dedicated functions

Systems, apparatus, and methods are disclosed for controlling internet-connected devices having embedded systems with dedicated functions. A lightweight software that protects the internet-connected devices from security breaches and security threat is installed on the internet-connected devices. The lightweight software sends network traffic data to a management server via one or more rendezvous servers. The management server analyzes the network traffic data and generates a security update. The security update is posted on a blockchain. The lightweight software obtains the security update in the form of a blockchain transaction.

System and method for defining machine-to-machine communicating devices and defining and distributing computational tasks among same

A system and method for issuing commands to remote devices comprising determining a criterion that forms a rule for a service, the service comprising a service property, a service method, and a service event, distributing the rule to a behavior engine on a programmable device, the behavior engine comprising a set of rules, and evaluating, at the behavior engine, if a trigger criterion for the rule is met. Upon determining that the trigger criterion is met, the method may further comprise performing an action comprising evaluating, at the behavior engine, if a condition is met, and upon determining that the condition is met, issuing a command to perform a first action comprising setting a service property and calling a service method for all devices including the service property within a scope of the action, defining an action scope.

System and method for defining machine-to-machine communicating devices and defining and distributing computational tasks among same

A system and method for issuing commands to remote devices comprising determining a criterion that forms a rule for a service, the service comprising a service property, a service method, and a service event, distributing the rule to a behavior engine on a programmable device, the behavior engine comprising a set of rules, and evaluating, at the behavior engine, if a trigger criterion for the rule is met. Upon determining that the trigger criterion is met, the method may further comprise performing an action comprising evaluating, at the behavior engine, if a condition is met, and upon determining that the condition is met, issuing a command to perform a first action comprising setting a service property and calling a service method for all devices including the service property within a scope of the action, defining an action scope.

METHODS, APPARATUS, AND SYSTEMS FOR CONTROLLING INTERNET-CONNECTED DEVICES HAVING EMBEDDED SYSTEMS WITH DEDICATED FUNCTIONS

Systems, apparatus, and methods are disclosed for controlling internet-connected devices having embedded systems with dedicated functions. A lightweight software that protects the internet-connected devices from security breaches and security threat is installed on the internet-connected devices. The lightweight software sends network traffic data to a management server via one or more rendezvous servers. The management server analyzes the network traffic data and generates a security update. The security update is posted on a blockchain. The lightweight software obtains the security update in the form of a blockchain transaction.