VIDEO FRAMING
    582.
    发明公开
    VIDEO FRAMING 审中-公开

    公开(公告)号:US20240275921A1

    公开(公告)日:2024-08-15

    申请号:US18610990

    申请日:2024-03-20

    Abstract: Framing a video effectively and efficiently in video conferencing, video recording, and live streaming can be a challenge. The framing decision preferably captures users and their actions without degrading the user experience. To address this challenge, a framing pipeline can be implemented to include a plurality of detectors, a multi-detector fusion, and a motion planner. Multi-detector fusion can merge detections produced by different detectors at different rates. Motion planner can change the framing decision based on a merged region of interest and a target region of interest produced by multi-detector fusion. The framing pipeline includes one or more features that can achieve a robust, temporally stable, and visually pleasing framed video frames that smoothly tracks users over time without causing unpleasant artifacts in the video conferencing experience.

    POLICY-BASED SECURE CONTAINERS FOR MULTIPLE ENTERPRISE APPLICATIONS

    公开(公告)号:US20240275822A1

    公开(公告)日:2024-08-15

    申请号:US18542406

    申请日:2023-12-15

    CPC classification number: H04L63/205 H04L63/08 H04L63/105

    Abstract: Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy server. The client computing device sends device attribute information and a request for access to an enterprise application to the enterprise policy server. The enterprise policy server determines a device trust level based on the device attribute information and a data sensitivity level based on the enterprise application, and sends a security policy to the client computing device based on the device trust level and the data sensitivity level. The client computing device references or creates a secure container for the security policy, adds the enterprise application to the secure container, and enforces the security policy while executing the enterprise application in the secure container. Multiple enterprise applications may be added to each secure container. Other embodiments are described and claimed.

    OFFLOAD OF ACKNOWLEDGEMENTS TO A NETWORK DEVICE

    公开(公告)号:US20240275724A1

    公开(公告)日:2024-08-15

    申请号:US18405746

    申请日:2024-01-05

    CPC classification number: H04L47/12 H04L1/1812 H04L63/0428 H04L69/22

    Abstract: Examples described herein relate to a network device apparatus that includes a network interface card to process a received packet. In some examples, based on the received packet only including one or more frames for which acknowledgement of receipt is offloaded to the network interface card, generate an acknowledgement (ACK) message to acknowledge receipt of the received packet. In some examples, a frame for which acknowledgement of receipt is offloaded to the network interface card comprises a STREAM frame compatible with quick User Datagram Protocol (UDP) Internet Connections (QUIC). In some examples, a computing platform is coupled to the network interface card. In some examples, based on the received packet only including any frame for which acknowledgement of receipt is not offloaded to the network interface, the computing platform is to generate an ACK message for the received packet.

    METHODS AND APPARATUS FOR TILE-BASED STITCHING AND ENCODING OF IMAGES

    公开(公告)号:US20240273851A1

    公开(公告)日:2024-08-15

    申请号:US18569570

    申请日:2021-11-25

    CPC classification number: G06V10/16 G06T5/50 G06T7/11 G06T9/00 G06T2207/20221

    Abstract: Methods and apparatus for tile-based stitching and encoding of images are disclosed. An example apparatus to stitch and encode images includes tile generation circuitry to generate first input tiles from a first image and second input tiles from a second image, the first image from a first camera and the second image from a second camera. The example apparatus also includes stitching circuitry to process the first input tiles and the second input tiles to convert the first input tiles into corresponding first stitched tiles and to convert the second input tiles into corresponding second stitched tiles. The example apparatus further includes encoding circuitry to encode the first stitched tiles and the second stitched tiles in parallel, wherein the tile generation circuitry is to generate the first input tiles and the second input tiles based on division information associated with the encoding circuitry.

    ARCHITECTURE AND METHOD FOR V GROOVE FIBER ATTACH FOR A PHOTONIC INTEGRATED CIRCUIT (PIC)

    公开(公告)号:US20240272388A1

    公开(公告)日:2024-08-15

    申请号:US18168927

    申请日:2023-02-14

    CPC classification number: G02B6/4278 G02B6/4202 G02B6/4243

    Abstract: An architecture for v-groove fiber attach for a photonic integrated circuit (PIC). The architecture is characterized by a PIC with a thickness of less than 100 microns. A carrier layer is attached to the non-active surface of the PIC and v-grooves are etched into the active surface of the PIC wafer. The carrier layer functions as an etch stop during the etching of the v-grooves, thereby becoming a floor for the v-grooves and enabling the v-grooves to extend to a depth equal to the thickness of the PIC. The carrier layer can be a glass layer. The carrier layer can also be an electronic integrated circuit (EIC).

    Pathloss drop trusted agent misbehavior detection

    公开(公告)号:US12063511B2

    公开(公告)日:2024-08-13

    申请号:US17130631

    申请日:2020-12-22

    CPC classification number: H04W12/104 H04W4/40 H04W12/009

    Abstract: V2X trusted agents provide technical solutions for technical problems facing falsely reported locations of connected vehicles within V2X systems. These trusted agents (e.g., trusted members) may be used to detect an abrupt physical attenuation of a wireless signal and determine whether the attenuation was caused by signal occlusion caused by the presence of an untrusted vehicle or other untrusted object. When the untrusted vehicle is sending a message received by trusted agents, these temporary occlusions allow trusted members to collaboratively estimate the positions of untrusted vehicles in the shared network, and to detect misbehavior by associating the untrusted vehicle with reported positions. Trusted agents may also be used to pinpoint specific mobile targets. Information about one or more untrusted vehicles may be aggregated and distributed as a service.

Patent Agency Ranking