Storage systems and methods having container-based environment control

    公开(公告)号:US12145422B1

    公开(公告)日:2024-11-19

    申请号:US17532338

    申请日:2021-11-22

    Abstract: Systems and methods to provide environment control to individual containers of a storage system may include a distribution network including one or more sources, distribution lines, valves, sensors, and storage positions. The distribution network may be operated to provide air flow having desired environment attributes to individual storage positions that include supply and/or return lines and associated valves. Insulated containers having input and/or output lines and associated valves may couple to the distribution network upon placement at the storage positions, thereby providing air flow with desired environment attributes to individual insulated containers and associated items. Further, non-insulated containers may also be placed at the storage positions of the storage system without connecting to the distribution network.

    Sound source localization with reflection detection

    公开(公告)号:US12143783B1

    公开(公告)日:2024-11-12

    申请号:US17981705

    申请日:2022-11-07

    Inventor: Wai Chung Chu

    Abstract: A system configured to perform sound source localization (SSL) using reflection detection is provided. A device processes audio data from multiple microphones to determine timing information corresponding to sound sources. For example, the device may determine cross-correlation data for each microphone pair, determine autocorrelation data for each microphone, and then use the autocorrelation data and the cross-correlation data to calculate quality factors. The device may determine the direction of potential sound source(s) by generating Steered Response Power (SRP) data using the cross-correlation data. To perform reflection detection to distinguish between direct sounds and acoustic reflections, the device may generate modified SRP data using the quality factors. For example, the device may process the SRP data to detect two potential sound sources and then process the modified SRP data to determine that a first potential sound source corresponds to direct sound and a second potential sound source corresponds to acoustic reflections.

    Large scale asset evaluation and probing

    公开(公告)号:US12143415B1

    公开(公告)日:2024-11-12

    申请号:US17953194

    申请日:2022-09-26

    Abstract: Systems and techniques for detecting vulnerabilities and exploits within network assets in a near real-time manner. The systems provide for scanning and probing assets within an organization network based on determined or disclosed exploits from the wild. The system provides for digital risk protection that actively and passively hunts for potential organizational threats and vulnerabilities and generates alerts in real-time related to the detected exploits. The systems provide a platform for generating plugins to scan for the detected exploits and fingerprint assets for services hosted and potential vulnerabilities.

    Augmented reality furniture layout recommendation

    公开(公告)号:US12141929B1

    公开(公告)日:2024-11-12

    申请号:US18082213

    申请日:2022-12-15

    Abstract: Devices and techniques are described for augmented reality furniture layout recommendation. In some examples, first data comprising a three dimensional (3D) model of a room is received. Second data representing an intended usage of the room may be received. A first machine learning model may generate a first collection template using the first data and the second data. The first collection template may include first bounding box data representing a first category of furniture and second bounding box data representing a second category of furniture. The first bounding box data representing a first bounding box having a first size and located at a first position within the 3D model at a first orientation. The second bounding box data representing a second bounding box having a second size and located at a second position within the 3D model at a second orientation.

    Relevant object embedding in aggregated answers to questions regarding broad set of objects

    公开(公告)号:US12141529B1

    公开(公告)日:2024-11-12

    申请号:US17701427

    申请日:2022-03-22

    Abstract: Natural language-based question answering systems and techniques are generally described. In some examples, a natural language processing system, first natural language data. The natural language processing system may determine first slot data included in the first natural language data. A set of content items associated with the first slot data may be determined. A first machine learning model may use the first natural language data to generate prediction data associated with a first attribute among a list of attributes of the set of content items. In some examples, a first value associated with the first attribute for a first content item of the set of content items may be determined. Second natural language data may be generated based at least in part on the first value. The second natural language data may include a response to the first natural language data.

    Assigning new passcodes to electronic devices

    公开(公告)号:US12141252B1

    公开(公告)日:2024-11-12

    申请号:US18244031

    申请日:2023-09-08

    Abstract: An electronic book distribution system includes electronic devices that reset their passcodes after specified authentication failures. The passcodes of an individual electronic device is reset to a value that is generated using a predefined function of a randomly generated support code. The support code is displayed to the user, and the user is instructed to contact a support service in order to obtain the new passcode. The support service independently authenticates the user, calculates the new device passcode using the same predefined function used by the electronic device, and provides the new passcode to the user.

    Wearable device body detection
    168.
    发明授权

    公开(公告)号:US12141011B1

    公开(公告)日:2024-11-12

    申请号:US17847962

    申请日:2022-06-23

    Abstract: Described are systems, methods, and apparatus that utilize multiple sensors to conserve battery life of a device, limit potential disruption to a user, and reliably detect whether the device is worn by the user. In one example, a first sensor, such as an infrared sensor, may be activated to determine a proximity of the device to an object. If the device is within a proximity of the object, a second sensor, such as a photoplethysmography (PPG) sensor, may be activated to verify that the device is being worn by the user and then to continue collecting data that may be used to determine biometrics for the user.

    Certificate authority meta-resource for automated rotation and renewal

    公开(公告)号:US12137175B1

    公开(公告)日:2024-11-05

    申请号:US17364160

    申请日:2021-06-30

    Abstract: Described are automated systems and methods for employing certificate authority meta-resources to facilitate automatic renewal and/or rotation of certificates and/or certificate authorities in a PKI hierarchy. For example, embodiments of the present disclosure can provide creating a certificate authority meta-resource, which can maintain and monitor certain information to facilitate automatic renewal and rotation of certificates and/or certificate authorities in a PKI hierarchy. The certificate authority meta-resource can also keep track of the active certificate authorities and certificates to ensure that trust is maintained without manual configuration of the PKI hierarchy.

    Limiting use of encryption keys in an integrated circuit device

    公开(公告)号:US12137161B2

    公开(公告)日:2024-11-05

    申请号:US17548146

    申请日:2021-12-10

    Abstract: A host device may include an interconnect, a host memory, and a set of processor cores. A processor core may execute a VM assigned to a cryptographic key and may send a request to access a physical address in the host memory toward the interconnect. An enforcer device may receive the request and extract a key identifier from the request. The enforcer device may determine whether to allow the request to access the physical address via the interconnect based on the key identifier and a list of allowed keys stored on the enforcer device. If the enforcer device determines to not allow the request to access, the enforcer device may modify the physical address and/or the key identifier of the request.

Patent Agency Ranking