Patent classifications
G06F21/109
PROCESSOR CHIP AND CONTROL METHODS THEREOF
Disclosed in a processor chip configured to perform neural network processing. The processor chip includes a memory, a first processor configured to perform neural network processing on a data stored in the memory, a second processor and a third processor, and the second processor is configured to transmit a control signal to the first processor and the third processor to cause the first processor and the third processor to perform an operation.
PROCESSOR CHIP AND CONTROL METHODS THEREOF
Disclosed in a processor chip configured to perform neural network processing. The processor chip includes a memory, a first processor configured to perform neural network processing on a data stored in the memory, a second processor and a third processor, and the second processor is configured to transmit a control signal to the first processor and the third processor to cause the first processor and the third processor to perform an operation.
Method and system for detecting pirated video network traffic
A pirated video identification system for network operators to detect and identify both encrypted and unencrypted Internet protocol (IP) pirated video. The system uses ground truth data gathered from various video player clients as input to train a machine learning that then is used to analyze both real-time and historical IP flow data from a network to identify the IP addresses of both the source and destination of pirate video traffic on the network. They system can be used to aid in accurately measuring the volume and scale of pirated video traffic on a network as well as aiding in taking countermeasures against both the distributors and consumers of the pirated video.
AUTHENTICATION DEVICE
An authentication device (101) for verifying the security of a task being performed on an electronic device (105) operated by a user (102). The authentication device includes an image capture device for capturing image data of the electronic device and of the user interacting with the electronic device. The authentication device also includes processing circuitry for processing the captured image data to determine when the electronic device is performing a security related task and to determine when the electronic device has been subject to an event that has compromised or may compromise the security of the electronic device. The authentication device also includes an audio or visual output for providing instructions to the user to interact with the electronic device and for advising the user that the electronic device has been subject to an event that has compromised or may compromise the security of the electronic device.
3D printer and inventory control and distribution system for 3D designs
A digital platform enables 3D printing where the designs are protected from piracy/redistribution. A single board computer (SBC) communicates with a first server and a second server. The SBC requests a unique hardware ID from the first server, which assigns and sends the ID to the SBC. The SBC submits the ID and a secret key to the second server to request registration of a user and a printer, and the second server sends private certs, a client ID, and a unique public identifier to the SBC. The second server also receives and stores 3D print designs through a designer portal, and on-demand displays the designs in a GUI screen. The SBC user may purchase a 3D print design, and the second server, in response, sends an access token to the SBC. The SBC redeems the access token for a selected 3D print, and the second server adjusts geode for the selected 3D design for the particular printer, and streams the adjusted geode to the printer through the SBC, thereby protecting the code from unauthorized user/replication.
3D Printer and Inventory Control and Distribution System for 3D Designs
A computer system is configured for digital rights management for distributing and tracking downloadable proprietary source code defining a 3-D object and being usable to print the object on a 3D printer and protect the 3D object data from unauthorized printing. The computer system stores an inventory of proprietary source code corresponding to designs of a plurality of 3D objects, and enables a user to see the inventory of designs of the plurality of 3D objects in an online store, and permits the user to securely purchase use of the source code of a desired 3D object viewed therein. The computer system sends the proprietary source code defining the desired 3D object to a 3D printer, and controls printing of the desired 3D object made by the 3D printer to prevent further use of the source code when the purchased use in completed, using one of three different typologies.
Center Device
Methods and apparatus provide for: receiving inputs at at least one server from a controller over an internet connection; using the inputs in a processing system to produce data based thereon representing desired operations by a user of the controller; and transmitting the data from the service provider server system back over the internet connection.
Reliable and secure firmware update with a dynamic validation for internet of things (IoT) devices
A computing system for a secure and reliable firmware update through a verification process, dynamic validation and continuous monitoring for error or failure and speedy correction of Internet of Things (IoT) device operability. The invention uses a Trusted Execution Environment (TEE) for hardware-based isolation of the firmware update, validation and continuous monitoring services. The isolation is performed by hardware System on a Chip (SoC) Security Extensions such as ARM TrustZone or similar technologies on other hardware platforms. The invention therefore comprises Firmware Update Service (FUS), System Validation Service (SMS) and Continuous Monitoring Service (CMS) running in the TEE with dedicated memory and storage, thus providing a trusted configuration management functionality for the operating system (OS) code and applications on IoT devices. Services running in the TEE use both direct (hardware level) and indirect (software agents inside main execution environment (MEE)) methods of control of the MEE. Embodiments of the invention apply all updates to a staging (new) execution environment (SEE) without changing of the MEE.
Center device
Methods and apparatus provide for: receiving inputs at a service provider server system from a controller over an internet connection; using the inputs in a processing system to produce data based thereon representing desired operations by a user of the controller; and transmitting the data from the service provider server system back over the internet connection.
METHOD FOR MANAGING AN INSTANCE OF A CLASS
The invention is a method for managing an instance of a class in a secure element embedded in a hosting machine and including a Central Processing Unit, a storage area and a virtual machine. The method comprises a step of receiving by the secure element a load file containing a binary representation of a package of the class and a step of instantiating the instance from the package and storing the instance in the storage area. The load file includes a specific component which is a custom component within the meaning of Java Card specifications and which contains executable data. The instance requests the execution of a subset of the executable data by directly invoking the subset of executable data through an Application Programming Interface.