22699 patents
Page 32 of 1135
Utility
Techniques to verify and authenticate resources in a data center computer environment
5 Dec 23
Embodiments are generally directed apparatuses, methods, techniques and so forth to receive a sled manifest comprising identifiers for physical resources of a sled, receive results of an authentication and validation operations performed to authenticate and validate the physical resources of the sled, determine whether the results of the authentication and validation operations indicate the physical resources are authenticate or not authenticate.
Alberto J. Munoz, Murugasamy K. Nachimuthu, Mohan J. Kumar, Wojciech Powiertowski, Sergiu D. Ghetie, Neeraj S. Upasani, Sagar V. Dalvi, Chukwunenye S. Nnebe, Jeanne Guillory
Filed: 17 Oct 19
Utility
Multi-access edge computing (MEC) billing and charging tracking enhancements
5 Dec 23
An architecture to allow Multi-Access Edge Computing (MEC) billing and charge tracking, is disclosed.
Dario Sabella, Ned M. Smith, Neal Oliver, Kshitij Arun Doshi, Suraj Prabhakaran, Miltiadis Filippou, Francesc Guim Bernat
Filed: 23 Nov 21
Utility
60hgvnimq3bnwbfaj8i4xr qybzljq8mcfqn5xubifilwwaq530k
5 Dec 23
An apparatus for pilot tone synchronization in point-to-multipoint (P2MP) communication is described, including a transceiver configured to send a downstream transmission including pilot tones to one or more customer premises equipments (CPEs) in a P2MP group.
Rainer Strobel, Vladimir Oksman
Filed: 25 Feb 21
Utility
2jqovo0otthwva28ghoponmfku kp7fvu8
5 Dec 23
A system and method of wireless display, including a transmitter processing a first encrypted content into a second encrypted content without decoding, and transferring the second encrypted content over a wireless display connection to a receiver.
Changliang Wang
Filed: 8 Sep 21
Utility
bgwlxlwx76a5nn8meutfx5vz ybgrd9b82sgbxmdhya
5 Dec 23
Various embodiments herein provide techniques for Session Description Protocol (SDP)-based signaling of camera calibration parameters for multiple video streams.
Ozgur Oyman, Gang Shen, Wenqing Fu, Wei Zong, Juan Zhao
Filed: 4 Dec 20
Utility
k51f7vf2z6seh2o2mcc8wabyoqduuez5h72w1fnjf6jjwyvf
5 Dec 23
Technologies for secure data transfer of MMIO data between a processor and an accelerator.
Santosh Ghosh, Luis Kida, Reshma Lal
Filed: 20 Dec 22
Utility
ie14om4qn66lmqjh7anxv3khxfm1uf3l9y3t2eqgveiwsfhhugca6z6i1p9f
5 Dec 23
A processor core that includes a token generator circuit is to execute a first instruction in response to initialization of a software program that requests access to protected data output by a cryptographic operation.
Milind Girkar, Jason W. Brandt, Michael LeMay
Filed: 20 Aug 20
Utility
7l8vyt1x002osukdpx2g2xfaxzh015zu6cgjsp1prv7jbkssrnzzu
5 Dec 23
Various systems and methods for a collaborative phone reputation system are described herein.
Igor Tatourian, Rita H Wouhaybi, Hong Li, Tobias Kohlenberg
Filed: 6 May 21
Utility
a5jp0v5p0tn3s5r2nlwjt4jt7q78md7 j2n7v6x2e34cn1rrdgdxv21t75
5 Dec 23
Systems, devices, and techniques related to selecting a key frame for burst image processing are discussed.
Zoran Zivkovic
Filed: 16 Mar 20
Utility
py3d05dvfdw3jcyyd4fg4rwly6mg1vb9b35e1i4
5 Dec 23
An apparatus for a Next Generation Node-B (gNB) includes processing circuitry coupled to memory.
Jaemin Han, Alexander Sirotkin
Filed: 11 Feb 21
Utility
ynnf5uu3gprabd734d4efpia6e
5 Dec 23
In one embodiment, a domain controller (a) quarantines unknown devices at a first quarantine point at a first layer of a multi-layer communication model; (b) communicates with a domain name system (DNS) service to self-allocate and register a domain name with the DNS service; (c) receives a provisioning request for a first device via an access point, wherein the access point comprises a second quarantine point at a second layer of the multi-level communication model; (d) verifies a device type of the first device with the DNS service; and (e) responsive to that verification, provisions the first device into the domain.
Ned M. Smith, Ravi S. Subramaniam, David W. Grawrock
Filed: 22 Aug 22
Utility
znvk9oapjot7f yyn6bsssj0qf2xp1zhy7uppc6pkw4mh3fv8dr1bzqdmt
5 Dec 23
Various embodiments herein provide techniques for integrated access and backhaul (IAB) nodes that operate with simultaneous mobile terminal (MT) and distributed unit (DU) communication.
Lili Wei, Qian Li, Geng Wu
Filed: 3 Mar 21
Utility
ngonm7hvxsk9qa5n9qwvwm4f33scyjrwuwnb
5 Dec 23
Embodiments of a user equipment (UE) configured for new-radio (NR) operations in a fifth-generation (5G) system (5GS) may be configured to detect a downlink-control information (DCI) format that includes a one-shot hybrid automatic repeat request acknowledgement (HARQ-ACK) request field and a frequency domain resource assignment field (FDRA).
Yingyang Li, Seunghee Han
Filed: 10 Feb 21
Utility
8hp05bukhuwk4hu1md4myvwo8me4qejsnowxfapc9q1wfgsq9h 3ps
5 Dec 23
A method comprises identifying a first page in a computer readable memory communicatively coupled to the apparatus that has been marked as being stored in memory as plaintext even if accessed using cryptographic addresses, the first page in the computer readable memory comprising at least one encrypted data object, and set a page table entry bit for the first page to a first value which indicates that at least one memory allocation in the first page has been marked as being stored in memory as plaintext even if accessed using cryptographic addresses.
David M. Durham, Anna Trikalinou, Michael LeMay
Filed: 21 Mar 22
Utility
htzq92dbjy4aj42wczj q5bikkxky9zydnr03h8l4oe1ixy89ix8oalg01
5 Dec 23
A system can include a host device that includes a downstream port and an endpoint device that includes an upstream port.
Debendra Das Sharma
Filed: 26 Mar 20
Utility
au9ptn3u2i7wx9wy9xad04e0s8t8p9
5 Dec 23
In one embodiment, an apparatus comprises a memory and a processor.
Yen-Kuang Chen, Shao-Wen Yang, Ibrahima J. Ndiour, Yiting Liao, Vallabhajosyula S. Somayazulu, Omesh Tickoo, Srenivas Varadarajan
Filed: 20 Jan 23
Utility
nju6uw5a9gz0dk8kjtpd01q932xphje1vbc05lrixs80ck41212oob2
5 Dec 23
Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security.
Salessawi Ferede Yitbarek, Lawrence A. Booth, Jr., Brent D. Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
Filed: 3 Oct 22
Utility
2q4bhimpwaehyxhc4cn9r17xld19plqv15gz6kze7v22y6g6554haoity1lf
5 Dec 23
Embodiments are directed to protection of privacy and data on smart edge devices.
Lawrence A. Booth, Jr., Salessawi Ferede Yitbarek, Reshma Lal, Pradeep M. Pappachan, Brent D. Thomas
Filed: 28 Jul 22
Utility
da4y5qmbb5zhds3ivr68e69zb lnqy2cs5chvj1xmauq5k5iy
5 Dec 23
An apparatus and method for efficiently performing a multiply add or multiply accumulate operation.
Aditya Varma, Michael Espig
Filed: 14 Jun 22
Utility
4axwrs1gcx09fixiveel4wj6z4 2bk8ixw
5 Dec 23
In some examples, an apparatus uses a blockchain to agree on a time in an information exchange network.
Ned M. Smith, Rajesh Poornachandran, Michael Nolan, Simon N. Peffers
Filed: 29 Jun 18