Patent classifications
H04W12/125
SYSTEMS, METHODS, AND APPARATUS FOR WORKLOAD OPTIMIZED CENTRAL PROCESSING UNITS (CPUS)
Systems, methods, and apparatus for workload optimized central processing units are disclosed herein. An example apparatus includes a workload analyzer to determine an application ratio associated with the workload, the application ratio based on an operating frequency to execute the workload, a hardware configurator to configure, before execution of the workload, at least one of (i) one or more cores of the processor circuitry based on the application ratio or (ii) uncore logic of the processor circuitry based on the application ratio, and a hardware controller to initiate the execution of the workload with the at least one of the one or more cores or the uncore logic.
SYSTEMS, METHODS, AND APPARATUS FOR WORKLOAD OPTIMIZED CENTRAL PROCESSING UNITS (CPUS)
Systems, methods, and apparatus for workload optimized central processing units are disclosed herein. An example apparatus includes a workload analyzer to determine an application ratio associated with the workload, the application ratio based on an operating frequency to execute the workload, a hardware configurator to configure, before execution of the workload, at least one of (i) one or more cores of the processor circuitry based on the application ratio or (ii) uncore logic of the processor circuitry based on the application ratio, and a hardware controller to initiate the execution of the workload with the at least one of the one or more cores or the uncore logic.
CONTROL SYSTEM
A control system includes a computer configured to remotely control at least one of charging and discharging of a power storage device mounted on a control target. The computer is configured to transmit a first command indicating charging power or discharging power of the power storage device to the control target via each of a first communication path and a second communication path. The control system further includes a determination unit configured to determine whether or not any one of the first communication path and the second communication path is under a cyberattack by using a second command received by the control target via the first communication path when the computer transmits the first command, and a third command received by the control target via the second communication path when the computer transmits the first command.
CONTROL SYSTEM
A control system includes a computer configured to remotely control at least one of charging and discharging of a power storage device mounted on a control target. The computer is configured to transmit a first command indicating charging power or discharging power of the power storage device to the control target via each of a first communication path and a second communication path. The control system further includes a determination unit configured to determine whether or not any one of the first communication path and the second communication path is under a cyberattack by using a second command received by the control target via the first communication path when the computer transmits the first command, and a third command received by the control target via the second communication path when the computer transmits the first command.
Broadband repeater with security for ultrawideband technologies
An ultrawideband radio transceiver/repeater provides a low cost infrastructure solution that merges wireless and wired network devices while providing connection to the plant, flexible repeater capabilities, network security, traffic monitoring and provisioning, and traffic flow control for wired and wireless connectivity of devices or networks. The ultrawideband radio transceiver/repeater can be implemented in discrete, integrated, distributed or embedded forms.
Broadband repeater with security for ultrawideband technologies
An ultrawideband radio transceiver/repeater provides a low cost infrastructure solution that merges wireless and wired network devices while providing connection to the plant, flexible repeater capabilities, network security, traffic monitoring and provisioning, and traffic flow control for wired and wireless connectivity of devices or networks. The ultrawideband radio transceiver/repeater can be implemented in discrete, integrated, distributed or embedded forms.
Wireless PLC attack mitigation
A device for detecting nefarious communication signals in a vehicle includes a detection support logic, a nefarious logic, a filtering circuit, and a microcontroller. The device receives a measurement signal from the detection support logic. The device determines a characteristic of an alternating current (AC) signal during communication at a first time on a wiring harness of the vehicle based on the measurement signal. The device determines the characteristic of the AC signal at a second time based on the measurement signal. The device determines that the characteristic measured during the first time differs from the characteristic measured during the second time. The device transmits a blocking signal to the nefarious logic to filter a frequency band of a communication conductor of the wiring harness in response to the determination that the characteristic measured during the first time differs from the characteristic measured during the second time.
Wireless PLC attack mitigation
A device for detecting nefarious communication signals in a vehicle includes a detection support logic, a nefarious logic, a filtering circuit, and a microcontroller. The device receives a measurement signal from the detection support logic. The device determines a characteristic of an alternating current (AC) signal during communication at a first time on a wiring harness of the vehicle based on the measurement signal. The device determines the characteristic of the AC signal at a second time based on the measurement signal. The device determines that the characteristic measured during the first time differs from the characteristic measured during the second time. The device transmits a blocking signal to the nefarious logic to filter a frequency band of a communication conductor of the wiring harness in response to the determination that the characteristic measured during the first time differs from the characteristic measured during the second time.
System and Method for Intelligent Discovery and Rescue of Devices in an Internet-of-Things Network
A device network includes an Internet-of-things (IoT) device, a gateway device, a communication device, and a monitor system. The monitor system establishes a first communication path to the IoT device via the gateway device, determines that the gateway device has failed and that the first communication path has been interrupted, determines that the communication device is within communications range of the IoT device, and directs the communication device to establish a second communication path between the IoT device and the monitor system via the communication device in response to determining that the communication device is within communications range of the IoT device.
DETECTION OF SLEEP DEPRIVATION ATTACK AND MITIGATION
Systems and methods are provided for detecting and mitigating a sleep deprivation attack (SDA). A method for detection of the SDA includes one of tracking power consumption rate of a device, incoming request signals received by the device, or an activity duration of one or more physical interfaces of the device. A system for mitigation of the SDA includes the device to be protected from the SDA, a counter to count request signals received by the device from another device, a counter attack circuit to pose one or more security challenges by sending a request message to the other device once a counted number of request signals exceeds a pre-determined number, and a control circuit to terminate connection with the other device if an expected reply based on the request message is not received from the other device within a pre-determined time duration.