-
公开(公告)号:US11758031B2
公开(公告)日:2023-09-12
申请号:US17739684
申请日:2022-05-09
Applicant: Intel Corporation
Inventor: Rita H. Wouhaybi , John Vicente , Kirk Smith , Robert Chavez , Mark Yarvis , Steven M. Brown , Jeremy Ouillette , Roderick E. Kronschnabel , Matthew J. Schneider , Chris D. Lucero , Atul N. Hatalkar , Sharad K. Garg , Casey Rathbone , Aaron R. Berck , Xubo Zhang , Ron Kuruvilla Thomas , Mandeep Shetty , Ansuya Negi
IPC: G08B23/00 , G08B25/14 , G08B21/14 , G06F9/445 , G06F9/455 , H04L69/40 , H04L67/10 , G05B19/042 , G05B19/05 , G05B19/418 , H04L41/082 , H04L41/084 , H04L67/04 , H04L67/104 , H04L67/12 , H04L67/125 , H04L67/00 , G06F8/65 , G06F11/20 , H04L67/565 , H04L41/0668
CPC classification number: H04L69/40 , G05B19/042 , G05B19/054 , G05B19/41835 , G06F8/65 , G06F11/2023 , G06F11/2033 , H04L41/0668 , H04L41/082 , H04L41/0846 , H04L67/04 , H04L67/10 , H04L67/1048 , H04L67/1051 , H04L67/12 , H04L67/125 , H04L67/34 , H04L67/565 , G05B2219/1105 , G05B2219/1214 , G05B2219/32043 , G05B2219/33112 , G06F2201/805 , G06F2201/82 , G06F2201/85
Abstract: Various systems and methods for implementing a software defined industrial system are described herein. For example, an orchestrated system of distributed nodes may run an application, including modules implemented on the distributed nodes. In response to a node failing, a module may be redeployed to a replacement node. In an example, self-descriptive control applications and software modules are provided in the context of orchestratable distributed systems. The self-descriptive control applications may be executed by an orchestrator or like control device and use a module manifest to generate a control system application. For example, an edge control node of the industrial system may include a system on a chip including a microcontroller (MCU) to convert IO data. The system on a chip includes a central processing unit (CPU) in an initial inactive state, which may be changed to an activated state in response an activation signal.
-
公开(公告)号:US20200310394A1
公开(公告)日:2020-10-01
申请号:US16650454
申请日:2018-09-28
Applicant: Intel Corporation
Inventor: Rita H. Wouhaybi , Jonh Vicente , Kirk Smith , Robert Chavez , Mark Yarvis , Steven M. Brown , Jeremy Ouilette , Roderick E. Kronschnabel , Matthew J. Schneider , Chris D. Lucero , Atul N. Hatalkar , Sharad Garg , Casey Rathbone , Aaron R. Berck , Xubo Zhang , Ron Kuruvilla Thomas , Mandeep Shetty , Ansuya Negi
IPC: G05B19/418 , G06F8/65 , G06F11/20
Abstract: Various systems and methods for implementing a software defined industrial system are described herein. For example, an orchestrated system of distributed nodes may run an application, including modules implemented on the distributed nodes. In response to a node failing, a module may be redeployed to a replacement node. In an example, self-descriptive control applications and software modules are provided in the context of orchestratable distributed systems. The self-descriptive control applications may be executed by an orchestrator or like control device and use a module manifest to generate a control system application. For example, an edge control node of the industrial system may include a system on a chip including a microcontroller (MCU) to convert IO data. The system on a chip includes a central processing unit (CPU) in an initial inactive state, which may be changed to an activated state in response an activation signal.
-
23.
公开(公告)号:US10726120B2
公开(公告)日:2020-07-28
申请号:US15475239
申请日:2017-03-31
Applicant: Intel Corporation
Inventor: Ansuya Negi , Ravi L. Sahita
Abstract: In one embodiment, a system includes a processor having one or more cores and a security processor coupled to the processor. The security processor may be configured to execute in a trusted execution environment, where the security processor includes a local attestation circuit to validate an enclave stored in a protected region of a system memory as a trusted agent, based at least in part on an identifier of the enclave stored in a whitelist. Other embodiments are described and claimed.
-
公开(公告)号:US10360442B2
公开(公告)日:2019-07-23
申请号:US15876846
申请日:2018-01-22
Applicant: Intel Corporation
Inventor: Ansuya Negi , Scott Pfursich , David L. Graumann , Ranjit S. Narjala , Rahuldeva Ghosh
Abstract: System and techniques for spoofing detection in image biometrics are described herein. A sequence of images may be obtained from a camera; a first plurality of images in the sequence of images including a representation of a user body part, and a second plurality of images in the sequence of images including a representation of an environment of the user. A marker may be created for the representation of the body part. A feature of the environment of the user present during the second plurality of images may be identified in the sequence of images using a third group of circuits. A correlation between the marker and the feature of the environment in the sequence of images may be quantified to produce a synchronicity metric of the degree to which the marker and the feature of the environment correlate.
-
公开(公告)号:US20190041830A1
公开(公告)日:2019-02-07
申请号:US16147190
申请日:2018-09-28
Applicant: Intel Corporation
Inventor: Mark Yarvis , Rita H. Wouhaybi , Ron Kuruvilla Thomas , Casey Rathbone , Aaron R. Berck , Sharad Garg , Robert Chavez , Kirk Smith , Mandeep Shetty , Xubo Zhang , Ansuya Negi
IPC: G05B19/418
Abstract: Various systems and methods are provided for implementing a software defined industrial system. In an example, self-descriptive control applications and software modules are provided in the context of orchestratable distributed systems. The self-descriptive control applications may be executed by an orchestrator or like control device, configured to: identify available software modules adapted to perform functional operations in a control system environment; identify operational characteristics that identify characteristics of execution of the available software modules that are available to implement a control system application; select a software module for execution based on the operational configuration and the operational characteristics identified in the manifest; and cause the execution of the selected software module in the control system environment based on an application specification for the control system application.
-
26.
公开(公告)号:US10079684B2
公开(公告)日:2018-09-18
申请号:US14974893
申请日:2015-12-18
Applicant: Intel Corporation
Inventor: Ansuya Negi , Nitin V. Sarangdhar , Ulhas S. Warrier , Ramkumar Venkatachary , Ravi L. Sahita , Scott H. Robinson , Karanvir S. Grewal
CPC classification number: H04L9/3231 , H04L9/0816 , H04L9/0825
Abstract: Technologies for end-to-end biometric-based authentication and locality assertion include a computing device with one or more biometric devices. The computing device may securely exchange a key between a driver and a secure enclave. The driver may receive biometric data from the biometric sensor in a virtualization-protected memory buffer and encrypt the biometric data with the shared key. The secure enclave may decrypt the biometric data and perform a biometric authentication operation. The computing device may measure a virtual machine monitor (VMM) to generate attestation information for the VMM. A secure enclave may execute a virtualization report instruction to request the attestation information. The processor may copy the attestation information into the secure enclave memory. The secure enclave may verify the attestation information with a remote attestation server. If verified, the secure enclave may provide a shared secret to the VMM. Other embodiments are described and claimed.
-
公开(公告)号:US09690998B2
公开(公告)日:2017-06-27
申请号:US14779842
申请日:2014-12-19
Applicant: Intel Corporation
Inventor: Ansuya Negi , David L. Graumann , Rahuldeva Ghosh , Ranjit S. Narjala
IPC: G06K9/00
CPC classification number: G06K9/00899 , G06K9/00221 , G06K9/4604
Abstract: Systems and techniques for facial spoofing detection in image based biometrics are described herein. A marker may be created for a representation of a face in a first plurality of images of a sequence of images. The marker corresponds to a facial feature of the face. An environmental feature of an environment of the face may be identified across a second plurality of images of the sequence of images. A correlation between the marker and the environmental feature in the sequence of images may be quantified to produce a synchronicity metric. A spoofing attempt may be indicated in response to the synchronicity metric meeting a threshold.
-
公开(公告)号:US09672415B2
公开(公告)日:2017-06-06
申请号:US14779540
申请日:2015-03-27
Applicant: Intel Corporation
Inventor: Scott Pfursich , David L. Graumann , Rahuldeva Ghosh , Ansuya Negi , Ranjit S Narjala
CPC classification number: G06K9/00288 , G06K9/00228 , G06K9/00261 , G06K9/00268 , G06K9/00302 , G06K9/00604 , G06K9/00892 , G06K9/00899 , G06K9/46 , G06K9/52 , H04L63/0861 , H04W12/06
Abstract: System and techniques for spoofing detection in image biometrics are described herein. A sequence of images may be obtained from a camera; a first plurality of images in the sequence of images including a representation of a user body part, and a second plurality of images in the sequence of images including a representation of an environment of the user. A marker may be created for the representation of the body part. A feature of the environment of the user present during the second plurality of images may be identified in the sequence of images using a third group of circuits. A correlation between the marker and the feature of the environment in the sequence of images may be quantified to produce a synchronicity metric of the degree to which the marker and the feature of the environment correlate.
-
公开(公告)号:US09594969B1
公开(公告)日:2017-03-14
申请号:US14945652
申请日:2015-11-19
Applicant: Intel Corporation
Inventor: Ansuya Negi , Nitin V. Sarangdhar
CPC classification number: G06K9/00906 , G06K9/00604 , G06K9/00617 , G06K9/2018 , G06K9/4661 , G06K9/52 , H04N5/2256 , H04N5/33
Abstract: This disclosure pertains to iris recognition including liveness testing. A device may perform iris recognition with testing to check liveness. Sensing circuitry in the device may comprise an IR sensor and IR emitter to generate a uniform IR emission and a pulsed IR emission. Sensor data based on the uniform IR emission may be used for iris recognition, which may be confirmed by at least one test confirming that real eyes are being analyzed and not spoof data. For example, a determination may be made as to whether a light reflection is visible in images captured by the IR sensor, whether the light reflection is aligned and/or synchronized with an eye center and/or iris center, whether a portion of the iris visible in the captured images changes from image to image, whether the images show that a pupil of the eye is reactive to the pulsed IR emissions, etc.
Abstract translation: 本公开涉及虹膜识别,包括活性测试。 设备可以通过测试执行虹膜识别以检查活动。 器件中的感测电路可以包括IR传感器和IR发射器,以产生均匀的IR发射和脉冲IR发射。 基于均匀红外发射的传感器数据可用于虹膜识别,这可以通过至少一个测试来确认,以确认正在分析真实眼睛并且不欺骗数据。 例如,可以确定在由IR传感器拍摄的图像中光反射是否可见,光反射是否与眼睛中心和/或虹膜中心对准和/或同步,无论虹膜的一部分 所捕获的图像中可见的图像是否从图像变为图像,图像是否显示眼睛的瞳孔对脉冲的红外发射等有反应。
-
-
-
-
-
-
-
-