-
公开(公告)号:US11250336B2
公开(公告)日:2022-02-15
申请号:US15857087
申请日:2017-12-28
Applicant: Intel Corporation
Inventor: Francesc Guim Bernat , Suraj Prabhakaran , Kshitij Arun Doshi , Da-Ming Chiang , Joe Cahill
IPC: G06N5/04
Abstract: Various systems and methods of initiating and performing contextualized AI inferencing, are described herein. In an example, operations performed with a gateway computing device to invoke an inferencing model include receiving and processing a request for an inferencing operation, selecting an implementation of the inferencing model on a remote service based on a model specification and contextual data from the edge device, and executing the selected implementation of the inferencing model, such that results from the inferencing model are provided back to the edge device. Also in an example, operations performed with an edge computing device to request an inferencing model include collecting contextual data, generating an inferencing request, transmitting the inference request to a gateway device, and receiving and processing the results of execution. Further techniques for implementing a registration of the inference model, and invoking particular variants of an inference model, are also described.
-
公开(公告)号:US11095618B2
公开(公告)日:2021-08-17
申请号:US15941724
申请日:2018-03-30
Applicant: Intel Corporation
Inventor: Kshitij Arun Doshi , Francesc Cesc Guim Bernat , Suraj Prabhakaran
Abstract: Systems and techniques for AI model and data camouflaging techniques for cloud edge are described herein. In an example, a neural network transformation system is adapted to receive, from a client, camouflaged input data, the camouflaged input data resulting from application of a first encoding transformation to raw input data. The neural network transformation system may be further adapted to use the camouflaged input data as input to a neural network model, the neural network model created using a training data set created by applying the first encoding transformation on training data. The neural network transformation system may be further adapted to receive a result from the neural network model and transmit output data to the client, the output data based on the result.
-
公开(公告)号:US20210100070A1
公开(公告)日:2021-04-01
申请号:US16995011
申请日:2020-08-17
Applicant: Intel Corporation
Inventor: Dario Sabella , Ned M. Smith , Neal Conrad Oliver , Kshitij Arun Doshi , Suraj Prabhakaran , Francesc Guim Bernat , Miltiadis Filippou
IPC: H04W88/18 , H04W48/08 , H04L29/06 , H04W4/44 , H04W88/16 , H04L29/08 , H04L12/24 , G06F9/455 , G06F8/70 , H04W12/00
Abstract: Various systems and methods for enhancing a distributed computing environment with multiple edge hosts and user devices, including in multi-access edge computing (MEC) network platforms and settings, are described herein. A device of a lifecycle management (LCM) proxy apparatus obtains a request, from a device application, for an application multiple context of an application. The application multiple context for the application is determined. The request from the device application for the application multiple context for the application is authorized. A device application identifier based on the request is added to the application multiple context. A created response for the device application based on the authorization of the request is transmitted to the device application. The response includes an identifier of the application multiple context.
-
公开(公告)号:US20210089685A1
公开(公告)日:2021-03-25
申请号:US17100580
申请日:2020-11-20
Applicant: Intel Corporation
Inventor: Sunil Cheruvu , Ned M. Smith , Kshitij Arun Doshi
Abstract: Methods, systems, and use cases for verifying operations of trusted hardware, such as with a memory monitor, are disclosed, with implementation in a computing system. In an example, a computing system includes memory circuitry including a DRAM device, processing circuitry operably coupled to the DRAM device, and a field programmable gate array (FPGA) configured to install and provision a memory monitor. The memory monitor is provided from an external verifier entity, and the memory monitor is operated by the FPGA to monitor operations of the DRAM device. The FPGA includes a Root of Trust (RoT) hardware component that is compliant with a Device Identifier Composition Engine (DICE) trusted computing specification, and DICE attestation using the RoT hardware component is used to verify a secure state of the memory monitor with the verifier entity, during operation of the memory monitor.
-
公开(公告)号:US20210021609A1
公开(公告)日:2021-01-21
申请号:US17064218
申请日:2020-10-06
Applicant: Intel Corporation
Inventor: Ned M. Smith , Sunil Cheruvu , Francesc Guim Bernat , Kshitij Arun Doshi , Eve M. Schooler , Dario Sabella
IPC: H04L29/06
Abstract: Various aspects of methods, systems, and use cases for verification and attestation of operations in an edge computing environment are described, based on use of a trust calculus and established definitions of trustworthiness properties. In an example, an edge computing verification node is configured to: obtain a trust representation, corresponding to an edge computing feature, that is defined with a trust calculus and provided in a data definition language; receive, from an edge computing node, compute results and attestation evidence from the edge computing feature; attempt validation of the attestation evidence based on attestation properties defined by the trust representation; and communicate an indication of trustworthiness for the compute results, based on the validation of the attestation evidence. In further examples, the trust representation and validation is used in a named function network (NFN), for dynamic composition and execution of a function.
-
公开(公告)号:US20190072979A1
公开(公告)日:2019-03-07
申请号:US15694250
申请日:2017-09-01
Applicant: Intel Corporation
Inventor: Vadim Sukhomlinov , Kshitij Arun Doshi , Katalin K. Bartfai-Walcott
Abstract: In some embodiments, the disclosed subject matter involves communication and negotiation between an autonomous entity or vehicle with a network of communication resources within a smart premises. The communication resources may include entry, landing or navigation beacons and a building infrastructure service. Negotiation for guidance, entry and other authorized tasks or services may be performed in a distributed fashion while en route or in proximity to a communication resource, rather than scheduled by a centralized server. Other embodiments are described and claimed.
-
公开(公告)号:US20190044831A1
公开(公告)日:2019-02-07
申请号:US15857526
申请日:2017-12-28
Applicant: Intel Corporation
Inventor: Francesc Guim Bernat , Kshitij Arun Doshi , Suraj Prabhakaran , Raghu Kondapalli , Alexander Bachmutsky
IPC: H04L12/24
Abstract: Various systems and methods for implementing a service-level agreement (SLA) apparatus receive a request from a requester via a network interface of the gateway, the request comprising an inference model identifier that identifies a handler of the request, and a response time indicator. The response time indicator relates to a time within which the request is to be handled indicates an undefined time within which the request is to be handled. The apparatus determines a network location of a handler that is a platform or an inference model to handle the request consistent with the response time indicator, and routes the request to the handler at the network location.
-
公开(公告)号:US20250128698A1
公开(公告)日:2025-04-24
申请号:US18572548
申请日:2021-09-24
Applicant: Intel Corporation
Inventor: Vesh Raj Sharma Banjade , S M Iftekharul Alam , Arvind Merwaday , Satish Chandra Jha , Kathiravetpillai Sivanesan , Kuilin Clark Chen , Francesc Guim Bernat , Kshitij Arun Doshi , Leonardo Gomes Baltar , Suman A. Sehra , Soo Jin Tan , Markus Dominik Mueck
IPC: B60W30/06 , B60L53/36 , B60L53/63 , B60L55/00 , G06Q20/40 , G06Q30/0283 , G08G1/0967 , G08G1/14
Abstract: Systems and techniques for location management are described herein. In an example, a system may include at least one processor and at least one memory with instructions stored thereon that when executed by the processor, cause the processor to obtain data originating from one or more sensors proximate to the location. A trained activity-based detection model may identify an activity at the location and perform a determination of a service to be offered at the location based on the detected activity. The system may then send a message to a user offering the service to the user, and in response to receiving an authorization accepting the service from the user, cause the service to be implemented at the location, which may include classifying the service as a service type, matching the service type to a service provider, and sending a notification to the service provider.
-
公开(公告)号:US12282403B2
公开(公告)日:2025-04-22
申请号:US17484253
申请日:2021-09-24
Applicant: Intel Corporation
Inventor: Kshitij Arun Doshi , Francesc Guim Bernat
IPC: G06F11/30 , G06F8/65 , G06F11/07 , G06F11/14 , G06F11/22 , G06F11/36 , G06F11/362 , G06F11/3668
Abstract: Various methods, systems, and use cases for a stable and automated transformation of a networked computing system are provided, to enable a transformation to the configuration of the computing system (e.g., software or firmware upgrade, hardware change, etc.). In an example, automated operations include: identifying a transformation to apply to a configuration of the computing system, for a transformation that affects a network service provided by the computing system; identifying operational conditions used to evaluate results of the transformation; attempting to apply the transformation, using a series of stages that have rollback positions when the identified operational conditions are not satisfied; and determining a successful or unsuccessful result of the attempt to apply the transformation. For an unsuccessful result, remediation may be performed to the configuration, with use of one or more rollback positions; for a successful result, a new restore state is established from the completion state.
-
公开(公告)号:US20250112825A1
公开(公告)日:2025-04-03
申请号:US18977434
申请日:2024-12-11
Applicant: Intel Corporation
Inventor: Francesc Guim Bernat , Kshitij Arun Doshi , Ned M. Smith
IPC: H04L41/084 , G06F1/20 , G06F9/48 , G06F9/50 , G06F9/54 , G06F11/30 , H04L9/06 , H04L9/32 , H04L41/0869 , H04L41/5054 , H04L47/78 , H04L49/00 , H04L67/10 , H04W4/08 , H04W12/04
Abstract: Various aspects of methods, systems, and use cases for multi-entity (e.g., multi-tenant) edge computing deployments are disclosed. Among other examples, various configurations and features enable the management of resources (e.g., controlling and orchestrating hardware, acceleration, network, processing resource usage), security (e.g., secure execution and communication, isolation, conflicts), and service management (e.g., orchestration, connectivity, workload coordination), in edge computing deployments, such as by a plurality of edge nodes of an edge computing environment configured for executing workloads from among multiple tenants.
-
-
-
-
-
-
-
-
-