-
公开(公告)号:US11095985B2
公开(公告)日:2021-08-17
申请号:US16862208
申请日:2020-04-29
Applicant: Intel Corporation
Inventor: Rajesh Poornachandran , David Gottardo , Swarnendu Kar , Saurabh Dadu , Mark MacDonald
Abstract: An example apparatus includes: a first earpiece to be positioned proximate a first ear of a user and including: a first microphone to transduce ambient sound external to the first earpiece into a first ambient audio signal, the ambient sound including sound indicative of a potential danger; and a first speaker to transduce a first input audio signal into music and the first ambient audio signal into the sound indicative of the potential danger; and a second earpiece to be positioned proximate a second ear of the user and including: a second microphone to transduce the ambient sound external to the second earpiece into a second ambient audio signal, the ambient sound including the sound indicative of the potential danger; and a second speaker to transduce a second input audio signal into the music and the second ambient audio signal into the sound indicative of the potential danger.
-
公开(公告)号:US11042168B2
公开(公告)日:2021-06-22
申请号:US16296762
申请日:2019-03-08
Applicant: INTEL CORPORATION
Inventor: Ned M. Smith , Rajesh Poornachandran
IPC: G05D1/10 , H04W4/40 , H04W4/44 , H04W4/38 , H04W12/10 , G01S5/00 , G06Q20/12 , B64C39/02 , H04W12/108 , G08G5/00
Abstract: Various embodiments are generally directed to providing information capture by multiple drones, which may operate in a swarm, while maintaining rights and/or value assigned to the content authored by each drone or by subsets of drones. In general, the present disclosure provides that drones participating in content acquisition may attest to their authenticity to establish trust between drones in the swarm.
-
公开(公告)号:US20210141665A1
公开(公告)日:2021-05-13
申请号:US17122693
申请日:2020-12-15
Applicant: Intel Corporation
Inventor: Rajesh Poornachandran , Rajendrakumar Chinnaiyan , Vincent Zimmer , Ravikiran Chukka
Abstract: Systems, apparatuses and methods may provide for technology that detects an over current condition associated with a voltage regulator in a computing system, identifies a configurable over current protection policy associated with the voltage regulator, and automatically takes a protective action based on the configurable over current protection policy. In one example, the protective action includes one or more of a frequency throttle of a processor coupled to the voltage regulator in isolation from one or more additional processors in the computing system, a deactivation of the processor in isolation from the one or more additional processors, an issuance of a virtual machine monitor notification, an issuance of a data center fleet manager notification, or an initiation of a migration of a workload from the processor to at least one of the additional processor(s).
-
公开(公告)号:US10791373B2
公开(公告)日:2020-09-29
申请号:US15858320
申请日:2017-12-29
Applicant: Intel Corporation
Inventor: Karthik Veeramani , Rajneesh Chowdhury , Jill Boyce , Rajesh Poornachandran
IPC: H04N21/4728 , H04N5/232 , G06T11/00 , H04N21/438 , H04N21/81 , H04N21/44 , G06T3/40 , H04N21/258 , H04N21/25 , H04N21/2543
Abstract: A semiconductor package apparatus may include technology to aggregate region of interest information for omni-directional video content from two or more sources, select video information from the omni-directional video content based on the aggregated region of interest information, and generate one or more two-dimensional videos based on the selected video information. Other embodiments are disclosed and claimed.
-
公开(公告)号:US20200302301A1
公开(公告)日:2020-09-24
申请号:US16894535
申请日:2020-06-05
Applicant: Intel Corporation
Inventor: Glen J. Anderson , Rajesh Poornachandran , Ignacio Alvarez , Giuseppe Raffa , Jill Boyce , Ankur Agrawal , Kshitij Doshi
Abstract: Logic may determine a specific performance of a neural network based on an event and may present the specific performance to provide a user with an explanation of the inference by a machine learning model such as a neural network. Logic may determine a first activation profile associated with the event, the first activation profile based on activation of nodes in one or more layers of the neural network during inference to generate an output. Logic may correlate the first activation profile against a second activation profile associated with a first training sample of training data. Logic may determine that the first training sample is associated with the event based on the correlation. Logic may output an indicator to identify the first training sample as being associated with the event.
-
公开(公告)号:US10747884B2
公开(公告)日:2020-08-18
申请号:US15778980
申请日:2015-12-24
Applicant: INTEL CORPORATION
Inventor: Jiewen Yao , Vincent J. Zimmer , Wei Li , Rajesh Poornachandran , Giri P. Mudusuru
IPC: G06F21/57 , G06F21/44 , G06F21/53 , G06F9/4401 , G06F9/54
Abstract: Techniques for providing and maintaining protection of firmware routines that form part of a chain of trust through successive processing environments. An apparatus may include a first processor component (550); a volatile storage (562) coupled to the first processor component; an enclave component to, in a pre-OS operating environment, generate a secure enclave within a portion of the volatile storage to restrict access to a secured firmware loaded into the secure enclave; a first firmware driver (646) to, in the pre-OS operating environment, provide a first API to enable unsecured firmware to call a support routine of the secured firmware from outside the secure enclave; and a second firmware driver (647) to, in an OS operating environment that replaces the pre-OS operating environment, provide a second API to enable an OS of the OS operating environment to call the support routine from outside the secure enclave.
-
公开(公告)号:US10649918B2
公开(公告)日:2020-05-12
申请号:US15718640
申请日:2017-09-28
Applicant: INTEL CORPORATION
Inventor: Rajesh Poornachandran , Vincent J. Zimmer , Ned M. Smith , Nadhiya Chandramohan
IPC: G06F12/14 , G06F9/4401 , G06F9/455 , G06F21/57 , G06F12/06 , G06F11/10 , G11C29/52 , G06F21/53 , G06N20/00 , G11C29/02
Abstract: Techniques are provided for managing memory hot-add to a computing platform. A system implementing the techniques according to an embodiment includes a Field Programmable Gate Array (FPGA) memory controller (FMC) including a Memory Reference Code (MRC) Register Transfer Level (RTL) module to perform training of a memory module in response to receiving a memory hot-add event notification associated with the memory module. The MRC training includes memory timing adjustment based on configuration policies. The system also includes a management controller circuit to communicate with a remote administration server over a secure out-of-band network channel. The communication includes the configuration policies to be applied by the FMC circuit to the memory module. The FMC circuit further includes an analytics RTL module to perform bandwidth analysis and traffic prioritization, an encryption RTL module to perform encryption, and an error correction code (ECC) RTL module in conjunction with the configuration policies.
-
公开(公告)号:US10572634B2
公开(公告)日:2020-02-25
申请号:US15640025
申请日:2017-06-30
Applicant: Intel Corporation
Inventor: Rajneesh Chowdhury , Karthik Veeramani , Rajesh Poornachandran
IPC: H04L29/06 , G06F21/12 , G06F21/60 , H04W12/08 , H04N21/254 , H04N21/4627 , H04L29/08 , G06F21/10 , H04N21/41 , H04N21/4363 , H04N21/6437
Abstract: Embodiments include apparatuses, methods, and systems including a wireless display system to provide digital right management secure content to a display receiver device. The display transmitter device may determine to provide a decryption and presentation license for the display receiver device based on the DRM credential and the DRM scheme of the display receiver device. The display transmitter device may further pass through the secure DRM content to the display receiver device based on provision of the decryption and presentation license, wherein the secure DRM content is passed through the display transmitter device without transcription by the display transmitter device. Other embodiments may also be described and claimed.
-
公开(公告)号:US10536708B2
公开(公告)日:2020-01-14
申请号:US15712058
申请日:2017-09-21
Applicant: INTEL CORPORATION
IPC: H04N19/70 , H04N19/169 , H04N19/31 , H04N19/109 , H04N19/114 , H04N19/65 , H04N19/895
Abstract: A method for efficient frame loss recovery and reconstruction (EFLRR) in a dyadic hierarchy is described herein. The method includes obtaining a current frame of a group of pictures. The method also includes calculating a Dyadic Hierarchy Picture Index difference based on a layer information in response to a prior frame missing in the group of pictures. Finally, the method includes decoding the current frame in response to a determined frame continuity based on the Dyadic Hierarchy Picture Index difference.
-
90.
公开(公告)号:US10528765B2
公开(公告)日:2020-01-07
申请号:US15267322
申请日:2016-09-16
Applicant: Intel Corporation
Inventor: Ned M. Smith , Rajesh Poornachandran
IPC: G06F21/44 , G06F21/64 , G06F9/4401 , G06F21/57
Abstract: Technologies for configuring a FPGA include a computing device having a processor and an FPGA. The computing device starts a secure boot process to establish a chain of trust that includes a trusted execution environment. The trusted execution environment loads an FPGA hash from an FPGA manifest stored in secure storage, and a platform trusted execution environment determines whether the FPGA hash is allowed for launch. To determine if the FPGA hash is allowed for launch, the platform trusted execution environment may evaluate one or more launch policies from the FPGA manifest. If allowed, the trusted execution environment configures the FPGA with an FPGA image corresponding to the FPGA hash and verifies the FPGA image with the FPGA hash. The platform trusted execution environment may receive the FPGA hash from a user via a trusted I/O session or from a remote management server. Other embodiments are described and claimed.
-
-
-
-
-
-
-
-
-