Scalable deep learning video analytics

    公开(公告)号:US10740675B2

    公开(公告)日:2020-08-11

    申请号:US16151783

    申请日:2018-10-04

    Abstract: In one embodiment, a method includes receiving current data, the current data including time series data representing a plurality of time instances. The method includes storing at least a recent portion of the current data in a buffer. The method includes reducing the dimensionality of the current data to generate dimensionality-reduced data. The method includes generating a reconstruction error based on the dimensionality-reduced data and a plurality of neural network metrics. At least one of a size of the recent portion of the current data stored in the buffer or an amount of the reducing the dimensionality of the current data is based on the reconstruction error.

    ADAPTIVE UNION FILE SYSTEM BASED PROTECTION OF SERVICES

    公开(公告)号:US20190253452A1

    公开(公告)日:2019-08-15

    申请号:US15896182

    申请日:2018-02-14

    Abstract: In one embodiment, a device maintains a journal of uncommitted changes to a file system of the device in a layer that is hot-swappable with a writable container layer. The device augments the journal with metadata regarding a particular uncommitted change to the file system of the device. The device applies, within a sandbox environment of the device, a machine learning-based anomaly detector to the particular uncommitted change to the file system and the metadata regarding the change, to determine whether the particular uncommitted change to the file system is indicative of a destruction of service attack on the device. The device causes performance of a mitigation action when the machine learning-based anomaly detector determines that the particular uncommitted change to the file system is indicative of a destruction of service attack on the device.

    Methods and Apparatus for Secure Device Pairing for Secure Network Communication Including Cybersecurity

    公开(公告)号:US20190097809A1

    公开(公告)日:2019-03-28

    申请号:US15713463

    申请日:2017-09-22

    Abstract: In one illustrative example, a network cybersecurity procedure may be employed with use of at least one unmanned aerial vehicle (UAV), where the UAV includes an intermediary pairing device for providing a temporary connection between a first network (e.g. a private LAN) and a second network (e.g. the Internet). The network cybersecurity procedure may involve deploying the UAV in proximity to the first network, such that the intermediary pairing device pairs with a first pairing device via a first transceiver and with a second pairing device via a second transceiver. A temporary connection is established between the first network connected via the first pairing device and the second network connected via the second pairing device. Data is communicated between a first device (e.g. IoT device) or server of the first network and a second device or server of the second network over the temporary connection. During this time, the intermediary pairing device executes a cybersecurity service function. Once completed, the UAV may be withdrawn out of proximity of the first network. One or more features of the cybersecurity service function may be updated and the UAV redeployed. Multimodal data fusion techniques with use of a plurality of network and device sensors may be employed for device verification and/or anomaly detection.

    Information-centric networking (ICN) techniques for facilitating the shared transport of passengers or items

    公开(公告)号:US10158973B1

    公开(公告)日:2018-12-18

    申请号:US15662082

    申请日:2017-07-27

    Abstract: Techniques in an information-centric network (ICN) for facilitating the transport of passengers or items are described. In one illustrative example, a first mobile device is configured to operate as a mobile transportation-offering ICN endpoint device. The first mobile device may connect to one of a plurality of fixed-location ICN nodes in the ICN network. The first mobile device may communicate in the ICN network one or more interest packet messages indicating an interest in a passenger or item to transport. The interest in a passenger or item to transport may be indicated in, for example, a Named Data Object (NDO). The one or more interest packet messages may include current transportation route information indicating a current anticipated route of transportation for a current passenger or item. In response, the first mobile device may receive, from a second mobile device configured to operate as a mobile transportation-accepting ICN node, one or more response messages indicating an acceptance of the transport.

    Performing transactions between application containers

    公开(公告)号:US10067810B2

    公开(公告)日:2018-09-04

    申请号:US15222890

    申请日:2016-07-28

    Abstract: Various implementations disclosed herein provide a method for performing one or more transactions between application containers. In various implementations, the method includes transmitting a key request to a first network node within a cluster of network nodes that are configured to generate and maintain a distributed ledger. In some implementations, the key request indicates that the requested key is for one or more transactions between a first application container and a second application container. In various implementations, the method includes receiving a key in response to transmitting the key request. In some implementations, the key is valid for the one or more transactions between the first application container and the second application container. In various implementations, the method includes synthesizing, at the first application container, transaction data with the key. In various implementations, the method includes transmitting, by the first application container, the transaction data to the second application container.

Patent Agency Ranking