OBJECTS OF INTEREST IN ADDITIVE MANUFACTURING

    公开(公告)号:US20230229143A1

    公开(公告)日:2023-07-20

    申请号:US17928902

    申请日:2021-05-27

    CPC classification number: G05B19/41835 B33Y50/00 G05B2219/49023

    Abstract: An example method for use in additive manufacturing comprises operating, by a processor, on object model data, the object model data describing an object to be generated in an additive manufacturing process. The example method comprises determining, by a processor, based on the object model data, whether a portion of the object to be generated is identified as an object of interest. In response to a determination that a portion of the object to be generated is identified as an object of interest, then the method comprises determining, by a processor, whether a policy-based action is associated with the object of interest. In response to a determination that a policy-based action is associated with the object of interest, then the method comprises executing, by a processor, the policy-based action, and generating, by a processor, the object according to the policy-based action.

    BIOS SECURITY
    3.
    发明申请
    BIOS SECURITY 审中-公开

    公开(公告)号:US20190087582A1

    公开(公告)日:2019-03-21

    申请号:US16083818

    申请日:2016-10-21

    Abstract: Examples associated with basic input/output system (BiOS) security are described. One example includes detecting a mismatch between an active BiOS setting and a saved BIOS setting. An update previously applied to the active BiOS setting is validated. The update Is applied to the saved BIOS setting creating an updated BIOS setting. The saved BIOS setting is updated when the updated BIOS setting and the active BIOS setting match. The saved BIOS setting is updated to the active BIOS setting. A security action is taken when the updated BiOS setting and the active BiOS setting differ.

    ESTABLISHING SHARED KEY DATA FOR WIRELESS PAIRING

    公开(公告)号:US20190036689A1

    公开(公告)日:2019-01-31

    申请号:US16074544

    申请日:2016-09-08

    Abstract: In an example, a method includes pairing a first electronic device and a data relay apparatus associated with a second electronic device to establish a secure wireless communication link therebetween. Each of the first electronic device and the data relay apparatus may be associated with an identifier and a verifier, each verifier being to verify the identifier of the other of the first electronic device or data relay apparatus. The pairing may include mutual verification of an identifier using the verifier, establishing shared key data and using the shared key data to establish a shared secret value for use in determining a derived key.

Patent Agency Ranking