Abstract:
Systems and methods for generating and using probabilistic filters are provided. One example method includes obtaining a plurality of beacon identifiers respectively associated with a plurality of beacon devices. The operations include determining a plurality of filter shards for each beacon identifier by applying a plurality of hash functions to each beacon identifier. The operations include providing the plurality of filter shards for each beacon identifier for local storage in a probabilistic filter at an observing entity, such that the observing entity can query the probabilistic filter to receive an indication of whether a received identifier is a member of a set that includes the plurality of beacon identifiers. One example system includes a plurality of beacon devices, at least one observing entity, and at least one verifying entity.
Abstract:
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon devices to detect the received signal strength indicator (“RSSI”) of beacon devices in proximity. Each servant beacon device transmits survey data packets comprising the RSSIs and hardware identifiers of proximate beacon devices to the master beacon device, which constructs a first virtual map of the mesh network. At a later time, each servant beacon device transmits authentication data packets, which are retransmitted, each retransmitting beacon inserting an RSSI and hardware identifier of the beacon device from which the authentication data packet was received, until they reach the master beacon device, which constructs a second virtual map of the mesh network. The master beacon device compares the first virtual map to the second virtual map to determine if the network is secure.
Abstract:
A server rack with vertically stacked shelves is disclosed. The shelves are used for housing loads (e.g. servers) and power supply units. Thus, both the power supply units and the servers are vertically stacked in the rack. An array of vertical and horizontal busses is secured to the back side of the server rack to electrically couple the servers with the power supply units. The arrangement of the PSUs and the busses provides for uniform current density across the server rack. The devices placed on the shelves are accessible and serviceable from the front of the server rack. The server rack can be placed within or secured to a device, system or a server room in a vertical orientation, a horizontal orientation or at an angle.
Abstract:
Systems and methods for generating and using ephemeral identifiers are provided. One example method includes determining, by one or more computing devices, a current time-count. The method includes determining, by the one or more computing devices, a time-modified identifier based at least in part on a static identifier and the current time-count. The method includes determining, by the one or more computing devices, an ephemeral identifier based at least in part on the time-modified identifier and a rotation key. One example system includes a plurality of beacon devices, at least one observing entity, and at least one verifying entity.
Abstract:
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon devices to detect the received signal strength indicator (“RSSI”) of beacon devices in proximity. Each servant beacon device transmits survey data packets comprising the RSSIs and hardware identifiers of proximate beacon devices to the master beacon device, which constructs a first virtual map of the mesh network. At a later time, each servant beacon device transmits authentication data packets, which are retransmitted, each retransmitting beacon inserting an RSSI and hardware identifier of the beacon device from which the authentication data packet was received, until they reach the master beacon device, which constructs a second virtual map of the mesh network. The master beacon device compares the first virtual map to the second virtual map to determine if the network is secure.
Abstract:
A power delivery system includes a power supply unit, a secondary power unit, a controller, and a monitor. The power supply unit is configured to receive primary power and provide operating DC power to a DC load. The secondary power unit is configured to store energy from the primary power. The controller is configured to control the secondary power unit during a testing period such that the secondary power unit uses the stored energy to provide secondary DC power to the load instead of the operating DC power. The monitor is configured to monitor the operation of the secondary power unit during the testing period and provide a signal indicative of whether the secondary power unit operated within defined parameters during the testing period.
Abstract:
A system and methods for protecting privacy via a gateway are provided. The system includes a data store comprising a computer readable medium storing a program of instructions for performing the protection of privacy via the gateway; a processor that executes the program of instructions; an event detection unit to detect an event behind the gateway; a correlation unit to detect a source associated with the detected event; a semi-stable identification unit to assign a semi-stable identification for the associated source with the detected event; a vector assigning unit to assign a vector to data associated with the semi-stable identification, the vector being related to the source independent any personal identification information (PII); and a communication unit to transmit the vector to instigate an action.
Abstract:
A method, executed by a processor, is used to determine presence of a viewer at a media device. The method includes receiving viewer biometric data captured by a biometric capture device associated with the media device; determining a category of the viewer based on the captured viewer biometric data; comparing the captured viewer biometric data to a reference to determine a possible identity of the viewer, by: determining a presence probability for the viewer based on a match between the biometric data and the reference, and determining a confidence level for the probability; and when the probability and confidence level equal or exceed a threshold, determining the viewer is present at the media device.
Abstract:
Systems and methods for generating and using ephemeral identifiers are provided. One example method includes determining, by one or more computing devices, a current time-count. The method includes determining, by the one or more computing devices, a time-modified identifier based at least in part on a static identifier and the current time-count. The method includes determining, by the one or more computing devices, an ephemeral identifier based at least in part on the time-modified identifier and a rotation key. One example system includes a plurality of beacon devices, at least one observing entity, and at least one verifying entity.
Abstract:
A method for conducting a media consumption study, includes at a processor of a position marker placed in a study site in a vicinity of a fixed media device; receiving a signal broadcast from a personal measurement device; determining signal information of the received broadcast signal, the signal information including identification information of the personal measurement device, and one or more signal characteristics; comparing the one or more signal characteristics to threshold values; and based on the comparison, determining the personal measurement device is in proximity to the fixed media device.