11 patents
Utility
Three-dimensional Indoor Wireless Service Assessment and Visualization
2 Mar 23
Disclosed are methods of generating a visual representation of a wireless service conditions in a three-dimensional display comprising: capturing, from a wireless device, a collection of data comprising wireless service conditions; determining from the data, a latitude and longitude and determining a reference altitude based on said latitude and longitude; determining from the data, a reported altitude in a coordinate system of choice; subtracting the reference altitude from the reported altitude in the coordinate system of choice; determining an estimated above-ground elevation of the data; and displaying in a visual representation the wireless service condition within a three-dimensional graphical image.
Artem KOLTSOV, Andrei COVALIOV, Matthew KNEBL
Filed: 25 Feb 22
Utility
Wireless network service assessment
12 Jul 22
Methods of creating an indoor confidence level comprising: receiving a location and location accuracy value from or for a device, wherein the location accuracy value is equated to a location accuracy circle; comparing the location and location accuracy circle to a map of known buildings and outdoor locations; and defining an indoor confidence level based upon the percent of overlap of the accuracy radius to a building on said map; and methods of defining an optimization priority among a set of collected data points for network connectivity.
Matthew Knebl, Andrei Covaliov, Artem Koltsov
Filed: 14 Feb 20
Utility
Wireless network service assessment
12 Jul 22
Methods of creating an indoor confidence level comprising: receiving a location and location accuracy value from or for a device, wherein the location accuracy value is equated to a location accuracy circle; comparing the location and location accuracy circle to a map of known buildings and outdoor locations; and defining an indoor confidence level based upon the percent of overlap of the accuracy radius to a building on said map; and methods of defining an optimization priority among a set of collected data points for network connectivity.
Matthew Knebl, Andrei Covaliov, Artem Koltsov
Filed: 17 Feb 20
Utility
Electronic document signing using blockchain
11 Jan 22
The systems and methods of the present disclosure can allow for uploading and signing of one or more electronic documents, e.g., by multiple users or participants.
Mahender Raju Adluri
Filed: 29 Aug 18
Utility
Method for Locating Signal Sources In Wireless Networks
30 Sep 21
A method of estimating the position of a wireless transmitter comprising: collecting a plurality of wireless measurements between a transmitter and a receiver; drawing a buffer circle around each measurement, having a radius defined by the timing advance delay measurements; plotting a plurality of buffer circles and identifying intersection points for adjacent measurements only; estimating the position based on the intersection of delay measurements from said plurality of wireless measurements.
Andrei Covaliov, Matthew Knebl, Artem Koltsov
Filed: 15 Jun 21
Utility
Method for locating signal sources in wireless networks
27 Jul 21
A method of estimating the position of a wireless transmitter comprising: collecting a plurality of wireless measurements between a transmitter and a receiver; drawing a buffer circle around each measurement, having a radius defined by the timing advance delay measurements; plotting a plurality of buffer circles and identifying intersection points for adjacent measurements only; estimating the position based on the intersection of delay measurements from said plurality of wireless measurements.
Andrei Covaliov, Matthew Knebl, Artem Koltsov
Filed: 14 Jan 21
Utility
Malware Detection Based on Training Using Automatic Feature Pruning with Anomaly Detection of Execution Graphs
28 Jan 21
A threat detection system for detecting malware can automatically decide, without manual expert-level interaction, the best set of features on which to train a classifier, which can result in the automatic creation of a signature-less malware detection engine.
Paul APOSTOLESCU, Melvin Antony, Aboubacar Toure, Jeff Markey, Prathap Adusumilli
Filed: 6 Jul 20
Utility
Wireless Network Service Assessment
21 Oct 20
Methods of creating an indoor confidence level comprising: receiving a location and location accuracy value from or for a device, wherein the location accuracy value is equated to a location accuracy circle; comparing the location and location accuracy circle to a map of known buildings and outdoor locations; and defining an indoor confidence level based upon the percent of overlap of the accuracy radius to a building on said map; and methods of defining an optimization priority among a set of collected data points for network connectivity.
Matthew Knebl, Andrei Covaliov, Artem Koltsov
Filed: 16 Feb 20
Utility
Malware detection based on training using automatic feature pruning with anomaly detection of execution graphs
6 Jul 20
A threat detection system for detecting malware can automatically decide, without manual expert-level interaction, the best set of features on which to train a classifier, which can result in the automatic creation of a signature-less malware detection engine.
Paul Apostolescu, Melvin Antony, Aboubacar Toure, Jeff Markey, Prathap Adusumilli
Filed: 15 Mar 15
Utility
Wireless Network Service Assessment
10 Jun 20
Methods of creating an indoor confidence level comprising: receiving a location and location accuracy value from or for a device, wherein the location accuracy value is equated to a location accuracy circle; comparing the location and location accuracy circle to a map of known buildings and outdoor locations; and defining an indoor confidence level based upon the percent of overlap of the accuracy radius to a building on said map; and methods of defining an optimization priority among a set of collected data points for network connectivity.
Matthew Knebl, Andrei Covaliov, Artem Koltsov
Filed: 13 Feb 20
Utility
Configuring Computing Devices Using a Template
18 Mar 20
According to example implementations, computing devices are configured using a template.
Deepali Aphale, James Boettcher, Leila Rossi
Filed: 8 Nov 19
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first