Wireless power transfer network management

    公开(公告)号:US11677275B2

    公开(公告)日:2023-06-13

    申请号:US17106285

    申请日:2020-11-30

    CPC classification number: H02J50/30 H02J50/80 H04B5/0037 H04W4/029 H04W16/28

    Abstract: Concepts and technologies directed to wireless power transfer network management are disclosed herein. Embodiments of a system can include an optical beamforming transmitter, a processor, and a memory that stores computer-executable instructions that configure a processor to perform operations. The operations can include receiving a power charge message that requests wireless power transfer to charge a battery system of a wirelessly chargeable equipment. The operations can include detecting that the wirelessly chargeable equipment is within a power transfer range of the optical beamforming transmitter. The operations can include determining that the wirelessly chargeable equipment is not stationary. The operations can include tracking movement of the wirelessly chargeable equipment and activating the optical beamforming transmitter that provides wireless power transfer to the wirelessly chargeable equipment while the wirelessly chargeable equipment is within the power transfer range.

    Installable mutable intelligent security package and security system in internet of things networks

    公开(公告)号:US11575690B2

    公开(公告)日:2023-02-07

    申请号:US16885376

    申请日:2020-05-28

    Abstract: Concepts and technologies disclosed herein are directed to an installable mutable intelligent security package (“IMISP”) and security system in Internet of Things (“IoT”) networks. According to one aspect disclosed herein, an IoT device can receive an IMISP. The IMISP can scan a plurality of memory locations of the memory for an IMISP operating system process. In response to finding the IMISP operating system process in a memory location of the plurality of memory locations, the IMISP and the IMISP operating system process can conduct a mutual authentication process. In response to a successful result of the mutual authentication process, the IMISP can self-install in the memory location. The IMISP can then scan the memory of the IoT device for an anomaly. In response to finding the anomaly, the IMISP can generate report that includes information associated with the anomaly.

    PROJECTING VIRTUAL PRESENCES ALONG A MOVING TRAJECTORY

    公开(公告)号:US20220406020A1

    公开(公告)日:2022-12-22

    申请号:US17821473

    申请日:2022-08-22

    Abstract: In one example, a method performed by a processing system includes controlling a first device in a first location to project a virtual presences in a current field of view of a subscriber of a virtual presence projection service, computing a moving trajectory of the subscriber from the first location to a second location, identifying a second device that is located along the moving trajectory, wherein the second device includes a second set of resources for projecting virtual presences, and wherein the second device is registered with the virtual presence projection service to lend the second set of resources to subscribers of the virtual presence projection service, and controlling the second device to project the virtual presence in the current field of view of the subscriber when the subscriber is no longer within range of the first device but is within range of the second device.

    Device Network Mapping Obscuration
    15.
    发明申请

    公开(公告)号:US20220360564A1

    公开(公告)日:2022-11-10

    申请号:US17307976

    申请日:2021-05-04

    Abstract: A sender device can determine that data associated with an application is to be sent to a service via a network. The sender device can generate resource queries directed to at least two participant devices and receive responses indicating whether each of the participant devices has a resource available to host a virtual network function (“VNF”). The sender device can generate commands directed to security interface applications executed by the participant devices. The commands can instruct the participant devices to instantiate the VNFs. The sender device can partition the data into data partitions directed to the participant devices. The sender device can send the data partitions to the VNFs of the participant devices. The VNFs can forward the data partitions to a network access device that can combine the data partitions and send the data to the service via the network.

    VIDEO COMMUNICATION DATA SECURITY
    17.
    发明申请

    公开(公告)号:US20210099433A1

    公开(公告)日:2021-04-01

    申请号:US16584670

    申请日:2019-09-26

    Abstract: A processing system including at least one processor may obtain a portion of a video stream, identify a first region of the portion of the video stream that contains a first item that is designated for obscuring, replace the first item in the first region of the portion of the video stream with an obscured version of the first item, and encrypt the portion of the video stream with a first encryption key. The processing system may further generate an executable package comprising the first item in the first region of the portion of the video, where the executable package is encrypted with a second encryption key, and transmit the portion of the video stream that is encrypted with the first encryption key and the executable package that is encrypted with the second encryption key to a recipient device.

    SYSTEM AND METHOD FOR ACTIVATING A NETWORK NODE

    公开(公告)号:US20200052961A1

    公开(公告)日:2020-02-13

    申请号:US16059509

    申请日:2018-08-09

    Abstract: In one embodiment, a method includes transmitting, by a node of a network, a first configuration file to a plurality of active nodes of the network and receiving, by the node of the network, a vote from one or more of the plurality of active nodes of the network. Each vote is generated by an active node in response to the active node comparing the first configuration file received from the node to a second configuration file received from a system administrator. The method also includes determining, based on each vote received from each active node, a percentage of the plurality of active nodes of the network that voted to approve the first configuration file. The method further includes determining, by the node of the network, whether to activate the node based on the percentage of the plurality of active nodes that voted to approve the first configuration file.

Patent Agency Ranking