-
公开(公告)号:US20210362679A1
公开(公告)日:2021-11-25
申请号:US16880162
申请日:2020-05-21
Applicant: Micron Technology, Inc.
Inventor: Bhumika Chhabra , Madison E. Wale , Claudia A. Delaney , Elsie de la Garza Villarreal
Abstract: Secure access to a vehicle is described, in which one or more biometric identifiers of a user may be utilized to enable the vehicle. The user may not operate the vehicle without satisfying security measures based on his/her biometric identifier generated from various biological traits. In some embodiments, an artificial engine and/or algorithm may be combined to facilitate the authentication process to determine whether the user is authorized to use the vehicle. The secure access features may also manage a list of biometric identifiers of the authorized users. In some instances, the secure access features may be temporarily disabled. Further, individual parts of the vehicle may be associated with a unique identifier of the vehicle (which may include a vehicle identification number), and/or may be configured to transmit their geological locations determined by a global positioning system (GPS).
-
公开(公告)号:US11178267B1
公开(公告)日:2021-11-16
申请号:US16891659
申请日:2020-06-03
Applicant: Micron Technology, Inc.
Inventor: Claudia A. Delaney , Bhumika Chhabra , Madison E. Wale , Elsie de la Garza Villarreal
IPC: H04M1/247 , G06F3/16 , G06F3/0481 , G06F3/0488 , H04M1/72403
Abstract: Methods and apparatuses for managing accessibility features for mobile devices are described. Accessibility features may facilitate a user to interface with his/her mobile device and may be referred to as user-interface parameters configured to generate output or to receive input. The mobile device may generate an accessibility icon corresponding to one or more user-interface parameters selected by the user. The mobile device may also store a set of values provided by the user, where individual values correspond to individual user-interface parameters. Subsequently, the mobile device displays the accessibility icon such that the user may actuate the accessibility icon to adjust the user-interface parameters based on the values. Further, the user-interface parameters may be adjusted to more than one set of values. The mobile device may generate multiple accessibility icons that each correspond to different collections of the user-interface parameters.
-
公开(公告)号:US20210350034A1
公开(公告)日:2021-11-11
申请号:US16871198
申请日:2020-05-11
Applicant: Micron Technology, Inc.
Inventor: Claudia A. Delaney , Elsie de la Garza Villarreal , Madison E. Wale , Bhumika Chhabra
Abstract: Embodiments are described for a pattern-based control system that learns and applies device usage patterns for identifying and disabling devices exhibiting abnormal usage patterns. The system can learn a user's normal usage pattern or can learn abnormal usage patterns, such as a typical usage pattern for a stolen device. This learning can include human or algorithmic identification of particular sets of usage conditions (e.g., locations, changes in settings, personal data access events, application events, IMU data, etc.) or training a machine learning model to identify usage condition combinations or sequences. Constraints (e.g., particular times or locations) can specify circumstances where abnormal pattern matching is enabled or disabled. Upon identifying an abnormal usage pattern, the system can disable the device, e.g., by permanently destroying a physical component, semi-permanently disabling a component, or through a software lock or data encryption.
-
公开(公告)号:US20210350012A1
公开(公告)日:2021-11-11
申请号:US16871210
申请日:2020-05-11
Applicant: Micron Technology, Inc.
Inventor: Claudia A. Delaney , Elsie de la Garza Villarreal , Madison E. Wale , Bhumika Chhabra
Abstract: Embodiments for enabling or disabling application features according to application-specific security settings are described. The application-specific security settings can control when particular security levels, corresponding to authentication procedures, are required. The security levels can correspond to authentication procedures such as requiring no password, only requiring a PIN, allowing authentication by biometrics, or requiring a password. The application-specific security settings can control security levels based on a variety of circumstances such as setting particular security levels for particular locations, setting different security levels based on time since last device use, etc. In various implementations, the security levels can be mapped to application features to enable or disable.
-
公开(公告)号:US20210204094A1
公开(公告)日:2021-07-01
申请号:US16943097
申请日:2020-07-30
Applicant: Micron Technology, Inc.
Inventor: Bhumika Chhabra , Claudia A. Delaney , Madison E. Wale , Elsie de la Garza Villarreal
Abstract: Methods and apparatuses for tracking a wireless peripheral device are described, in which various parameters are monitored to determine whether a predetermined condition satisfies a threshold. The parameters may be associated with a wireless communication link established between the wireless peripheral device and a host device. Further, the predetermined conditions may be related to circumstances that may result in losing the wireless communication link and/or the wireless peripheral device. In some cases, the wireless peripheral device may spontaneously transmit signals to the host device to inform its location or to request the host device to perform certain tasks. In some cases, the host device may send a command to the wireless peripheral device to report its location. Also, the wireless peripheral device may be configured to notify the owner upon accepting an input from a person who finds the wireless peripheral device.
-
公开(公告)号:US20240321822A1
公开(公告)日:2024-09-26
申请号:US18668777
申请日:2024-05-20
Applicant: Micron Technology, Inc.
Inventor: Owen R. Fay , Madison E. Wale , James L. Voelz , Dylan W. Southern , Dustin L. Holloway
IPC: H01L23/00
CPC classification number: H01L24/82 , H01L24/20 , H01L24/29 , H01L24/45 , H01L24/83 , H01L24/85 , H01L2224/82203 , H01L2924/1431 , H01L2924/1434
Abstract: Semiconductor devices having redistribution structures, and associated systems and methods, are disclosed herein. In some embodiments, a semiconductor assembly comprises a die stack including a plurality of semiconductor dies, and a routing substrate mounted on the die stack. The routing substrate includes an upper surface having a redistribution structure. The semiconductor assembly also includes a plurality of electrical connectors coupling the redistribution structure to at least some of the semiconductor dies. The semiconductor assembly further includes a controller die mounted on the routing substrate. The controller die includes an active surface that faces the upper surface of the routing substrate and is electrically coupled to the redistribution structure, such that the routing substrate and the semiconductor dies are electrically coupled to the controller die via the redistribution structure.
-
公开(公告)号:US12019790B2
公开(公告)日:2024-06-25
申请号:US18103285
申请日:2023-01-30
Applicant: Micron Technology, Inc.
Inventor: Claudia A. Delaney , Elsie de la Garza Villarreal , Madison E. Wale , Bhumika Chhabra
IPC: G06F21/88 , G06F21/31 , G06N20/00 , H04M1/72448 , H04M1/72451 , H04M1/72454 , H04M1/72463 , H04M15/00
CPC classification number: G06F21/88 , G06F21/316 , G06N20/00 , H04M1/72448 , H04M1/72451 , H04M1/72454 , H04M1/72463 , H04M15/47
Abstract: Embodiments are described for a pattern-based control system that learns and applies device usage patterns for identifying and disabling devices exhibiting abnormal usage patterns. The system can learn a user's normal usage pattern or can learn abnormal usage patterns, such as a typical usage pattern for a stolen device. This learning can include human or algorithmic identification of particular sets of usage conditions (e.g., locations, changes in settings, personal data access events, application events, IMU data, etc.) or training a machine learning model to identify usage condition combinations or sequences. Constraints (e.g., particular times or locations) can specify circumstances where abnormal pattern matching is enabled or disabled. Upon identifying an abnormal usage pattern, the system can disable the device, e.g., by permanently destroying a physical component, semi-permanently disabling a component, or through a software lock or data encryption.
-
公开(公告)号:US11706336B2
公开(公告)日:2023-07-18
申请号:US17733500
申请日:2022-04-29
Applicant: Micron Technology, Inc.
Inventor: Elsie de la Garza Villarreal , Madison E. Wale , Bhumika Chhabra , Claudia A. Delaney
IPC: H04M3/436 , H04M7/00 , H04M3/42 , H04L65/1076 , H04L65/1104
CPC classification number: H04M3/436 , H04L65/1079 , H04L65/1104 , H04M3/42059 , H04M7/0078
Abstract: Methods and apparatuses for managing spoofed calls to a mobile device are described, in which the mobile device receives a call transmitted over a cellular or mobile network. The call may include a set of information associated with the network, such as a geological location of a device that generated the call, a hardware device identifier corresponding to the device, an internet protocol (IP) address associated with the device, or a combination thereof. The mobile device may determine whether the call is spoofed or genuine based on the set of information. Subsequently, the mobile device may assist a user of the mobile device to manage the call, such as blocking the call from reaching the user, informing the user that the call is spoofed, facilitating the user to report the call as spoofed to an authority and/or a service provider of the network.
-
公开(公告)号:US11568095B2
公开(公告)日:2023-01-31
申请号:US16871198
申请日:2020-05-11
Applicant: Micron Technology, Inc.
Inventor: Claudia A. Delaney , Elsie de la Garza Villarreal , Madison E. Wale , Bhumika Chhabra
IPC: G06F21/88 , G06N20/00 , G06F21/31 , H04M1/72448 , H04M1/72454 , H04M1/72463 , H04M1/72451 , H04M15/00
Abstract: Embodiments are described for a pattern-based control system that learns and applies device usage patterns for identifying and disabling devices exhibiting abnormal usage patterns. The system can learn a user's normal usage pattern or can learn abnormal usage patterns, such as a typical usage pattern for a stolen device. This learning can include human or algorithmic identification of particular sets of usage conditions (e.g., locations, changes in settings, personal data access events, application events, IMU data, etc.) or training a machine learning model to identify usage condition combinations or sequences. Constraints (e.g., particular times or locations) can specify circumstances where abnormal pattern matching is enabled or disabled. Upon identifying an abnormal usage pattern, the system can disable the device, e.g., by permanently destroying a physical component, semi-permanently disabling a component, or through a software lock or data encryption.
-
公开(公告)号:US20220144208A1
公开(公告)日:2022-05-12
申请号:US17530374
申请日:2021-11-18
Applicant: Micron Technology, Inc.
Inventor: Madison E. Wale , Bhumika Chhabra , Claudia A. Delaney , Elsie de la Garza Villarreal
IPC: B60R25/102 , B60R25/25 , B60R25/04 , B60R25/33 , B60R25/34
Abstract: Methods and apparatuses for providing security notification based on biometric identifier are described, in which one or more biometric information of a person may be utilized to permit or prohibit the person to access the vehicle. As such, the person may not access (or operate) the vehicle without satisfying security measures based on his/her biometric identifier generated from various biological information collected from the person. When the person is not authorized to access the vehicle, the security measures may transmit a security notification to an owner of the vehicle (e.g., a mobile device of the owner, an account of the owner) such that the owner may take appropriate steps in response to receiving the security notification. Such a notification may include the biometric information of the person, other information collected from the sensing component, a set of options for the owner to select from, among others.
-
-
-
-
-
-
-
-
-